Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 00:20

General

  • Target

    af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe

  • Size

    6.0MB

  • MD5

    3943063d8a8fb69b50caf1acfead34ee

  • SHA1

    25b565a954aa0810ab4472004d30bc4792e1e5f5

  • SHA256

    af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b

  • SHA512

    c690729792cccbda50457d47ba204359fbd4fa6117c47b0169a0aa41c555d2e21ba293458c7ed407c048536b823e0ec959d31128bb4b0c3e6b9208a6e768610f

  • SSDEEP

    98304:c+6ehmwOFcFki+TQlF3Knk7cgEx2fI6y8ZKmQiTVvtH6+25obrcs1028:c+lQwmPiOG3H33I6ypWTVvtaNy228

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    nikitaawp.aiq.ru
  • Port:
    21
  • Username:
    u405447
  • Password:
    wngdce7s

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 64 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe
    "C:\Users\Admin\AppData\Local\Temp\af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\AppData\Local\Temp\HID.exe
      "C:\Users\Admin\AppData\Local\Temp\HID.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:208
          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
            C:\Users\Admin\AppData\Local\Temp\explorer.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3436
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
              6⤵
              • Drops startup file
              • Executes dropped EXE
              PID:3000
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4464
          • C:\Users\Admin\AppData\Local\Temp\HID.exe
            C:\Users\Admin\AppData\Local\Temp\HID.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4264
            • C:\Windows\svchost.com
              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:4584
              • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2344
                • C:\Windows\svchost.com
                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1732
                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                    C:\Users\Admin\AppData\Local\Temp\explorer.exe
                    9⤵
                    • Drops startup file
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:696
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                      10⤵
                      • Executes dropped EXE
                      PID:1172
                • C:\Windows\svchost.com
                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1728
                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4284
                    • C:\Windows\svchost.com
                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:2228
                      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                        C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                        11⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:3020
                        • C:\Windows\svchost.com
                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                          12⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of WriteProcessMemory
                          PID:1504
                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                            13⤵
                            • Drops startup file
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:1696
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                              14⤵
                              • Drops startup file
                              • Executes dropped EXE
                              PID:4908
                        • C:\Windows\svchost.com
                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                          12⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of WriteProcessMemory
                          PID:1856
                          • C:\Users\Admin\AppData\Local\Temp\HID.exe
                            C:\Users\Admin\AppData\Local\Temp\HID.exe
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3572
                            • C:\Windows\svchost.com
                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:1552
                              • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                15⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:3332
                                • C:\Windows\svchost.com
                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:1428
                                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                    C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                    17⤵
                                    • Drops startup file
                                    • Executes dropped EXE
                                    PID:2324
                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                      18⤵
                                      • Drops startup file
                                      • Executes dropped EXE
                                      PID:2136
                                • C:\Windows\svchost.com
                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  PID:4404
                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                    17⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    PID:2524
                                    • C:\Windows\svchost.com
                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      PID:2628
                                      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                        C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                        19⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        PID:2264
                                        • C:\Windows\svchost.com
                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          PID:3084
                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                            21⤵
                                            • Drops startup file
                                            • Executes dropped EXE
                                            PID:4872
                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              PID:3676
                                        • C:\Windows\svchost.com
                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          PID:3748
                                          • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                            C:\Users\Admin\AppData\Local\Temp\HID.exe
                                            21⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            PID:5028
                                            • C:\Windows\svchost.com
                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:1132
                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                23⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:3752
                                                • C:\Windows\svchost.com
                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:316
                                                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                    C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                    25⤵
                                                    • Drops startup file
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3732
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                      26⤵
                                                      • Executes dropped EXE
                                                      PID:976
                                                • C:\Windows\svchost.com
                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in Windows directory
                                                  PID:2228
                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                    25⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies registry class
                                                    PID:4052
                                                    • C:\Windows\svchost.com
                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                      26⤵
                                                      • Executes dropped EXE
                                                      PID:1032
                                                      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                        C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                        27⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        PID:1072
                                                        • C:\Windows\svchost.com
                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:3020
                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                            29⤵
                                                            • Drops startup file
                                                            • Executes dropped EXE
                                                            PID:1160
                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                              30⤵
                                                              • Executes dropped EXE
                                                              PID:1748
                                                        • C:\Windows\svchost.com
                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:876
                                                          • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                            C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                            29⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4752
                                                            • C:\Windows\svchost.com
                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:60
                                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                31⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:1292
                                                                • C:\Windows\svchost.com
                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  PID:4328
                                                                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                    33⤵
                                                                    • Drops startup file
                                                                    • Executes dropped EXE
                                                                    PID:1900
                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      PID:1756
                                                                • C:\Windows\svchost.com
                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  PID:4908
                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                    33⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:4828
                                                                    • C:\Windows\svchost.com
                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5112
                                                                      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:1120
                                                                        • C:\Windows\svchost.com
                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          PID:1588
                                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                            37⤵
                                                                            • Drops startup file
                                                                            • Executes dropped EXE
                                                                            PID:4404
                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              PID:1144
                                                                        • C:\Windows\svchost.com
                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in Windows directory
                                                                          PID:2608
                                                                          • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:3980
                                                                            • C:\Windows\svchost.com
                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Windows directory
                                                                              PID:3104
                                                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                39⤵
                                                                                • Checks computer location settings
                                                                                • Modifies registry class
                                                                                PID:3676
                                                                                • C:\Windows\svchost.com
                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                  40⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3704
                                                                                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                    41⤵
                                                                                    • Drops startup file
                                                                                    PID:2944
                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                      42⤵
                                                                                        PID:4016
                                                                                  • C:\Windows\svchost.com
                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                    40⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4472
                                                                                    • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                      41⤵
                                                                                      • Checks computer location settings
                                                                                      • Drops file in Windows directory
                                                                                      PID:3764
                                                                                      • C:\Windows\svchost.com
                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                        42⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:4424
                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                          43⤵
                                                                                          • Checks computer location settings
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies registry class
                                                                                          PID:1012
                                                                                          • C:\Windows\svchost.com
                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                            44⤵
                                                                                            • Drops file in Windows directory
                                                                                            PID:2124
                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                              45⤵
                                                                                              • Drops startup file
                                                                                              PID:4268
                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                46⤵
                                                                                                  PID:3192
                                                                                            • C:\Windows\svchost.com
                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                              44⤵
                                                                                                PID:4580
                                                                                                • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                  45⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Drops file in Windows directory
                                                                                                  PID:3640
                                                                                                  • C:\Windows\svchost.com
                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                    46⤵
                                                                                                    • Drops file in Windows directory
                                                                                                    PID:2192
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                      47⤵
                                                                                                      • Modifies registry class
                                                                                                      PID:4212
                                                                                                      • C:\Windows\svchost.com
                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                        48⤵
                                                                                                          PID:4564
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                            49⤵
                                                                                                            • Drops startup file
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1604
                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                              50⤵
                                                                                                                PID:4480
                                                                                                          • C:\Windows\svchost.com
                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                            48⤵
                                                                                                            • Drops file in Windows directory
                                                                                                            PID:4328
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                              49⤵
                                                                                                              • Checks computer location settings
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Modifies registry class
                                                                                                              PID:2244
                                                                                                              • C:\Windows\svchost.com
                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                50⤵
                                                                                                                  PID:1572
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                    51⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2676
                                                                                                                    • C:\Windows\svchost.com
                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                      52⤵
                                                                                                                      • Drops file in Windows directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:4464
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                        53⤵
                                                                                                                        • Drops startup file
                                                                                                                        PID:2032
                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                          54⤵
                                                                                                                            PID:3624
                                                                                                                      • C:\Windows\svchost.com
                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                        52⤵
                                                                                                                        • Drops file in Windows directory
                                                                                                                        PID:1504
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                          53⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Drops file in Windows directory
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:4864
                                                                                                                          • C:\Windows\svchost.com
                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                            54⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:4720
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                              55⤵
                                                                                                                              • Modifies registry class
                                                                                                                              PID:1736
                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                56⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:3264
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                  57⤵
                                                                                                                                  • Drops startup file
                                                                                                                                  PID:4492
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                    58⤵
                                                                                                                                      PID:3508
                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                  56⤵
                                                                                                                                    PID:2536
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                      57⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:3708
                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                        58⤵
                                                                                                                                          PID:4020
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                            59⤵
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:1440
                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                              60⤵
                                                                                                                                                PID:1192
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                  61⤵
                                                                                                                                                  • Drops startup file
                                                                                                                                                  PID:3192
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                    62⤵
                                                                                                                                                    • Drops startup file
                                                                                                                                                    PID:3848
                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                60⤵
                                                                                                                                                  PID:368
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                    61⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    PID:4580
                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                      62⤵
                                                                                                                                                        PID:708
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                          63⤵
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2624
                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                            64⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:1892
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                              65⤵
                                                                                                                                                              • Drops startup file
                                                                                                                                                              PID:2500
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                66⤵
                                                                                                                                                                  PID:1000
                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                              64⤵
                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4664
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                65⤵
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:4868
                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                  66⤵
                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                  PID:2368
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                    67⤵
                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:3900
                                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                      68⤵
                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                      PID:4404
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                        69⤵
                                                                                                                                                                        • Drops startup file
                                                                                                                                                                        PID:1504
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                          70⤵
                                                                                                                                                                            PID:2512
                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                        68⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:3748
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                          69⤵
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:4864
                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                            70⤵
                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                            PID:2344
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                              71⤵
                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:4660
                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                72⤵
                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                PID:4056
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                  73⤵
                                                                                                                                                                                  • Drops startup file
                                                                                                                                                                                  PID:3524
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                    74⤵
                                                                                                                                                                                      PID:3328
                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                  72⤵
                                                                                                                                                                                    PID:2892
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                      73⤵
                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:2568
                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                        74⤵
                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                        PID:3764
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                          75⤵
                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:4092
                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                            76⤵
                                                                                                                                                                                              PID:3348
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                77⤵
                                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                                PID:1576
                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                  78⤵
                                                                                                                                                                                                    PID:4292
                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                76⤵
                                                                                                                                                                                                  PID:1636
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                    77⤵
                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:2408
                                                                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                      78⤵
                                                                                                                                                                                                        PID:2960
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                          79⤵
                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:3152
                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                            80⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:4564
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                              81⤵
                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                              PID:2624
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                82⤵
                                                                                                                                                                                                                  PID:232
                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                              80⤵
                                                                                                                                                                                                                PID:5052
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                  81⤵
                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                  PID:2244
                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                    82⤵
                                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:5088
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                      83⤵
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      PID:3228
                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                        84⤵
                                                                                                                                                                                                                          PID:1944
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                            85⤵
                                                                                                                                                                                                                            • Drops startup file
                                                                                                                                                                                                                            PID:2496
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                              86⤵
                                                                                                                                                                                                                                PID:3756
                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                            84⤵
                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                            PID:3944
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                              85⤵
                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:3676
                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                86⤵
                                                                                                                                                                                                                                  PID:4152
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                    87⤵
                                                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                    PID:1804
                                                                                                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                      88⤵
                                                                                                                                                                                                                                        PID:2136
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                          89⤵
                                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                                          PID:3708
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                            90⤵
                                                                                                                                                                                                                                              PID:4424
                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                          88⤵
                                                                                                                                                                                                                                            PID:3660
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                              89⤵
                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                              PID:1744
                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                90⤵
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:4448
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                  91⤵
                                                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                  PID:1576
                                                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                    92⤵
                                                                                                                                                                                                                                                      PID:5004
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                        93⤵
                                                                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                                                                        PID:4128
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                          94⤵
                                                                                                                                                                                                                                                            PID:368
                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                        92⤵
                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                        PID:4568
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                          93⤵
                                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                          PID:1072
                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                            94⤵
                                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                                            PID:708
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                              95⤵
                                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                              PID:1620
                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                96⤵
                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                PID:3148
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                  97⤵
                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                  PID:4812
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                    98⤵
                                                                                                                                                                                                                                                                      PID:2116
                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                  96⤵
                                                                                                                                                                                                                                                                    PID:4208
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                      97⤵
                                                                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                      PID:2676
                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                        98⤵
                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                        PID:2032
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                          99⤵
                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                          PID:984
                                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                            100⤵
                                                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                            PID:464
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                              101⤵
                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                              PID:4200
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                102⤵
                                                                                                                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                PID:3084
                                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                            100⤵
                                                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                                                            PID:2884
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                              101⤵
                                                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                              PID:3920
                                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                102⤵
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                PID:2912
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                  103⤵
                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                  PID:4424
                                                                                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                    104⤵
                                                                                                                                                                                                                                                                                      PID:3928
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                        105⤵
                                                                                                                                                                                                                                                                                        • Drops startup file
                                                                                                                                                                                                                                                                                        PID:3596
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                          106⤵
                                                                                                                                                                                                                                                                                            PID:3764
                                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                        104⤵
                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                        PID:1440
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                          105⤵
                                                                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                                          PID:4448
                                                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                            106⤵
                                                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                            PID:4836
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                              107⤵
                                                                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                                              PID:2176
                                                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                108⤵
                                                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                PID:212
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                  109⤵
                                                                                                                                                                                                                                                                                                  • Drops startup file
                                                                                                                                                                                                                                                                                                  PID:1832
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                    110⤵
                                                                                                                                                                                                                                                                                                      PID:2408
                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                  108⤵
                                                                                                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                  PID:3616
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                    109⤵
                                                                                                                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                                                                                                                    PID:2812
                                                                                                                                                                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                      110⤵
                                                                                                                                                                                                                                                                                                        PID:2624
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                          111⤵
                                                                                                                                                                                                                                                                                                            PID:5084
                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                              112⤵
                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                              PID:4928
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                113⤵
                                                                                                                                                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                                                                                                                                                PID:4372
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                  114⤵
                                                                                                                                                                                                                                                                                                                    PID:2524
                                                                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                112⤵
                                                                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                PID:5100
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                  113⤵
                                                                                                                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                                  PID:2676
                                                                                                                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                    114⤵
                                                                                                                                                                                                                                                                                                                      PID:4620
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                        115⤵
                                                                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                                                                        PID:2620
                                                                                                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                          116⤵
                                                                                                                                                                                                                                                                                                                            PID:984
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                              117⤵
                                                                                                                                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                                                                                                                                              PID:4200
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                118⤵
                                                                                                                                                                                                                                                                                                                                  PID:1688
                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                              116⤵
                                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                              PID:4860
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                117⤵
                                                                                                                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                                                PID:4012
                                                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                  118⤵
                                                                                                                                                                                                                                                                                                                                    PID:3268
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                      119⤵
                                                                                                                                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                      PID:2228
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                        120⤵
                                                                                                                                                                                                                                                                                                                                          PID:3328
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                            121⤵
                                                                                                                                                                                                                                                                                                                                            • Drops startup file
                                                                                                                                                                                                                                                                                                                                            PID:1744
                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                              122⤵
                                                                                                                                                                                                                                                                                                                                                PID:4024
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                            120⤵
                                                                                                                                                                                                                                                                                                                                              PID:2192
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                121⤵
                                                                                                                                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                PID:4292
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                  122⤵
                                                                                                                                                                                                                                                                                                                                                    PID:1212
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                      123⤵
                                                                                                                                                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                      PID:2500
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                        124⤵
                                                                                                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                        PID:4320
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                          125⤵
                                                                                                                                                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                          PID:2156
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                            126⤵
                                                                                                                                                                                                                                                                                                                                                              PID:4328
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                          124⤵
                                                                                                                                                                                                                                                                                                                                                            PID:3616
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                              125⤵
                                                                                                                                                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                              PID:3152
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                126⤵
                                                                                                                                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                PID:2120
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                  127⤵
                                                                                                                                                                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                  PID:1120
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                    128⤵
                                                                                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                    PID:4232
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                      129⤵
                                                                                                                                                                                                                                                                                                                                                                      • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                      PID:2836
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                        130⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:1480
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                      128⤵
                                                                                                                                                                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                      PID:1012
                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                        129⤵
                                                                                                                                                                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                        PID:2128
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                          130⤵
                                                                                                                                                                                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                          PID:2344
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                            131⤵
                                                                                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                            PID:4200
                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                              132⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:4156
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                  133⤵
                                                                                                                                                                                                                                                                                                                                                                                  • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                  PID:1688
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                    134⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:4776
                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                  132⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:1644
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                      133⤵
                                                                                                                                                                                                                                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                      PID:408
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                        134⤵
                                                                                                                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                        PID:1032
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                          135⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                          PID:1804
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                            136⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:5004
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                137⤵
                                                                                                                                                                                                                                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                PID:876
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  138⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3328
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                136⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:1160
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                    137⤵
                                                                                                                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                    PID:4448
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      138⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:1748
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                          139⤵
                                                                                                                                                                                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                          PID:4752
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            140⤵
                                                                                                                                                                                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                            PID:3552
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                              141⤵
                                                                                                                                                                                                                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                              PID:1832
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                142⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4840
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                              140⤵
                                                                                                                                                                                                                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2176
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                141⤵
                                                                                                                                                                                                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                PID:1756
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  142⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2624
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      143⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4372
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                          144⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:5088
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              145⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1496
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                146⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3900
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                              144⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4928
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                145⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3228
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                  146⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2536
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      147⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4816
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                        148⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2268
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          149⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2132
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                            150⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4776
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                        148⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1960
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            149⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:316
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                              150⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:876
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                151⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3348
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  152⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3064
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    153⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1072
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      154⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4876
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    152⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:960
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      153⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4988
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          154⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:544
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            155⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:212
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                              156⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1900
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                157⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3332
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  158⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4748
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                156⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3512
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  157⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1504
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    158⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4372
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        159⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1848
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          160⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4928
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              161⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3320
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                162⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2024
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\svchost.com
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              160⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2344
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\HID.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                161⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Checks processor information in registry
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2536
                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                1⤵
                                                                                                                                                  PID:1696
                                                                                                                                                • C:\Windows\System32\sihclient.exe
                                                                                                                                                  C:\Windows\System32\sihclient.exe /cv ADzSgqqQoE22cqShqNChFw.0.2
                                                                                                                                                  1⤵
                                                                                                                                                    PID:3268

                                                                                                                                                  Network

                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    86KB

                                                                                                                                                    MD5

                                                                                                                                                    ef63e5ccbea2788d900f1c70a6159c68

                                                                                                                                                    SHA1

                                                                                                                                                    4ac2e144f9dd97a0cd061b76be89f7850887c166

                                                                                                                                                    SHA256

                                                                                                                                                    a46d1ffbe9114015050b2a778859c26248f8bab22d5d1a302b59373bc20c6b45

                                                                                                                                                    SHA512

                                                                                                                                                    913371abb54e0adc94aa08372a20f07ced9f9fdc170f9e468cd39c7387c7e30c1ae238148ccf355d5c8b88b7fd63f914bb108c6cafca9a791d02d8b36468bfac

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    5.7MB

                                                                                                                                                    MD5

                                                                                                                                                    3e4c1ecf89d19b8484e386008bb37a25

                                                                                                                                                    SHA1

                                                                                                                                                    a9a92b63645928e8a92dc395713d3c5b921026b7

                                                                                                                                                    SHA256

                                                                                                                                                    1ebe469c94c2c2a5acbc3927cef19dbe2f583ba3651a55623633891c4c05cc22

                                                                                                                                                    SHA512

                                                                                                                                                    473d03abbb61609749a176a0724e427599a4f4707d72a74ed457b2198098f59fdf64b5394798db82f4064dfe964083d70af6a50a5fa2ab2674c77a99792e4e52

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe

                                                                                                                                                    Filesize

                                                                                                                                                    175KB

                                                                                                                                                    MD5

                                                                                                                                                    3da833f022988fbc093129595cc8591c

                                                                                                                                                    SHA1

                                                                                                                                                    fdde5a7fb7a60169d2967ff88c6aba8273f12e36

                                                                                                                                                    SHA256

                                                                                                                                                    1ad4c736829dbcb0fcc620fd897fe0941b9c01e14ccba5d18085b3ca0416ab66

                                                                                                                                                    SHA512

                                                                                                                                                    1299d63337c958e8072d6aaa057904cbbaa51c2eec4457269ead6b72c4eb2a10882e4a5dc7afcdcab5a6910d2105c2e5ee706850074e0425ae7f87d9ea1e5537

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

                                                                                                                                                    Filesize

                                                                                                                                                    2.4MB

                                                                                                                                                    MD5

                                                                                                                                                    d9e8a1fa55faebd36ed2342fedefbedd

                                                                                                                                                    SHA1

                                                                                                                                                    c25cc7f0035488de9c5df0121a09b5100e1c28e9

                                                                                                                                                    SHA256

                                                                                                                                                    bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

                                                                                                                                                    SHA512

                                                                                                                                                    134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe

                                                                                                                                                    Filesize

                                                                                                                                                    131KB

                                                                                                                                                    MD5

                                                                                                                                                    514972e16cdda8b53012ad8a14a26e60

                                                                                                                                                    SHA1

                                                                                                                                                    aa082c2fbe0b3dd5c47952f9a285636412203559

                                                                                                                                                    SHA256

                                                                                                                                                    49091e1e41980b39d8de055fe6c6a1dc69398f17817960d64743e7efb740efc4

                                                                                                                                                    SHA512

                                                                                                                                                    98bbd6f06e3ff3e94aee3620f20f89e254dde157bc8129a64cf78fefe5cf9b13c7902128c2acbd54b3def527e09a039bd1f66ba64efb85f3f0404d894cabbee4

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    142KB

                                                                                                                                                    MD5

                                                                                                                                                    3ccfc6967bcfea597926999974eb0cf9

                                                                                                                                                    SHA1

                                                                                                                                                    6736e7886e848d41de098cd00b8279c9bc94d501

                                                                                                                                                    SHA256

                                                                                                                                                    a89d3e2109a8e35e263da363d3551258ea320a99bfb84a4b13ad563008eda8d9

                                                                                                                                                    SHA512

                                                                                                                                                    f550af4e053d89eff45c0fb00bb32e8d212645a155727d3536a3f12bb0b5550bed25516516334245b912fa4fc2e4e7c267e80da4f06d22ea128f20eb56ab4351

                                                                                                                                                  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    278KB

                                                                                                                                                    MD5

                                                                                                                                                    823cb3e3a3de255bdb0d1f362f6f48ab

                                                                                                                                                    SHA1

                                                                                                                                                    9027969c2f7b427527b23cb7ab1a0abc1898b262

                                                                                                                                                    SHA256

                                                                                                                                                    b8c5b99365f5ac318973b151fe3fe2a4ad12546371df69e1b7d749f7a4ce356f

                                                                                                                                                    SHA512

                                                                                                                                                    0652b60e07aa5a469b9cf1013a1ed98d0352996c59b9a66f612be2bc0081d8ec8a65a44a3977d2e188cd8ee3311edb251b818cf300d152ed5f633679a6cf834c

                                                                                                                                                  • C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    454KB

                                                                                                                                                    MD5

                                                                                                                                                    961c73fd70b543a6a3c816649e5f8fce

                                                                                                                                                    SHA1

                                                                                                                                                    8dbdc7daeb83110638d192f65f6d014169e0a79b

                                                                                                                                                    SHA256

                                                                                                                                                    f94ddaf929fb16d952b79c02e78439a10dd2faa78f7f66b7d52de2675e513103

                                                                                                                                                    SHA512

                                                                                                                                                    e5d97ee63b02abc65add41f6721514515b34fd79f7db23ae04cf608c2f7e0504e00b07694047b982d14d60cccf6f833b50268c693e3baf1b697d3370c0bba0b6

                                                                                                                                                  • C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe

                                                                                                                                                    Filesize

                                                                                                                                                    555KB

                                                                                                                                                    MD5

                                                                                                                                                    ead399a43035cf6544c96d014436fc9a

                                                                                                                                                    SHA1

                                                                                                                                                    c8ef64abb6c56cbd02e851a98214620459c8b947

                                                                                                                                                    SHA256

                                                                                                                                                    38b06ee250af6554e6740a1bb7acfb77b99ccdb8081880e01c386afa98668766

                                                                                                                                                    SHA512

                                                                                                                                                    6fa46a36c17c9496c18843e04d78d5146cdea173a74acacd9b7c63d220c49fa3a1acb65f91fe7214a1ae82ebf63fb5366beecd7f9e0aeee0cbab5d1bd0aa6d14

                                                                                                                                                  • C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe

                                                                                                                                                    Filesize

                                                                                                                                                    325KB

                                                                                                                                                    MD5

                                                                                                                                                    62976c65ded41b4f31c7f379c548e05c

                                                                                                                                                    SHA1

                                                                                                                                                    3827c414ad15cd67ea8635400002c4c79704250e

                                                                                                                                                    SHA256

                                                                                                                                                    80de06ea5d221e21f765a96750f821aaaf8eee23bfd9d8cde265a8da11041c66

                                                                                                                                                    SHA512

                                                                                                                                                    ddf74814c7a54a258b7200310bd644547f3a831e373c8392dddedd08b3c1ca60e864fbe2007e68fabdcfe1e923d9207039bde42a09e0ec07d69694263057fcd7

                                                                                                                                                  • C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe

                                                                                                                                                    Filesize

                                                                                                                                                    325KB

                                                                                                                                                    MD5

                                                                                                                                                    de9e6086062f01926b48c2d80508d12b

                                                                                                                                                    SHA1

                                                                                                                                                    13610cca5e38925e22b6a79067df0dd9eca49fe3

                                                                                                                                                    SHA256

                                                                                                                                                    d2f956514bc885fed054dec3ad4c0e89e59a6a38390fa8432abd15eb201468b4

                                                                                                                                                    SHA512

                                                                                                                                                    60478e55b6a3d49686ed8e95e939a2384fb1440950d710e7beedb9eda24be0e6996c931d0703d6cc0065fbe5a85eff463b9e9eaadf14746593abe723636137c3

                                                                                                                                                  • C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe

                                                                                                                                                    Filesize

                                                                                                                                                    505KB

                                                                                                                                                    MD5

                                                                                                                                                    7aac73055860fcd079d9407cab08276d

                                                                                                                                                    SHA1

                                                                                                                                                    482b9f337d60270c95950353f9ca8929d8926b1d

                                                                                                                                                    SHA256

                                                                                                                                                    97508a81b805937e1ca57711a51d2e8d715a2748e2f9d27d39dfecc28f3fb9e5

                                                                                                                                                    SHA512

                                                                                                                                                    f183a10eb13c083c7cd8e785a7978eee4998c33d1eb104a0ab0e54146e10651f68612249e668baa08919a5840f6f929b5452c93f71a232b30aab9e2857109fb5

                                                                                                                                                  • C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    335KB

                                                                                                                                                    MD5

                                                                                                                                                    48628eeb152032e8dc9af97aaaeba7cf

                                                                                                                                                    SHA1

                                                                                                                                                    e826f32c423627ef625a6618e7250f7dbc4d2501

                                                                                                                                                    SHA256

                                                                                                                                                    f271af83d96b1d536e1a1788ec0baa0c3c583ddfe61faceccaeec1470c5676ca

                                                                                                                                                    SHA512

                                                                                                                                                    18a2a247177d04d5b1b56d126d72e29b02c8378e8aa4c89bdbaefe14bcd577d7aa054b05a5db37d142a37cf869f3bc03fe9a5bba4886a52d6c2ede5052dfcc7d

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    139KB

                                                                                                                                                    MD5

                                                                                                                                                    415671ceca4f8e9fd6830ba812e41597

                                                                                                                                                    SHA1

                                                                                                                                                    0e5095e00711a69d44bfff529a8700528093ca52

                                                                                                                                                    SHA256

                                                                                                                                                    235bea563512a5532851bd2b1b2927cc0365904e1f851d7d94010b65e531092b

                                                                                                                                                    SHA512

                                                                                                                                                    ccafc59de0d100fc54d4099fd07b83e8a4d962e12bcecc3d1145ab41edc89bb3a5b9f3a00cc4d9df57bd7784666da7c00effc11cc5b991f9f97587cb8affeee8

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    244KB

                                                                                                                                                    MD5

                                                                                                                                                    788fde156cc6e54ee2962198ac4a6c53

                                                                                                                                                    SHA1

                                                                                                                                                    09e1560bf5ec8fb5706a91eff97e327af7b962ae

                                                                                                                                                    SHA256

                                                                                                                                                    4c4344610c8ba2c3b2c0f2e47c45b1d8c9799ef3448d409607d1f139ee523ebc

                                                                                                                                                    SHA512

                                                                                                                                                    8ed288766dd4cc65328136d200bb1ed3a38c33b82720979be78ab02466b8dbaf800cceb0c5967268286b1adf3ec6446ceec42b1f12ab6f0ccb77fef29b0c2e8c

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe

                                                                                                                                                    Filesize

                                                                                                                                                    290KB

                                                                                                                                                    MD5

                                                                                                                                                    7bbddd267ce18591182db1eb4a2c60d9

                                                                                                                                                    SHA1

                                                                                                                                                    430032d5e4d5e6f70875b66fd67f8278e6e03e30

                                                                                                                                                    SHA256

                                                                                                                                                    16a19e02738d2537a4bd2f1628c6541bf33f34bcd2d8c70e7ebbc2b7f24c9c82

                                                                                                                                                    SHA512

                                                                                                                                                    25accad2c34ffa17970dd53abb9ea0f3c2c0b5cf0b10ab979931af9ad2f3484c4a2e27d6a37c763f107851c29a08525a7c61f5beb2a2f8c2db3416b608a4e7d6

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    509KB

                                                                                                                                                    MD5

                                                                                                                                                    fdad5d6d8cf37e8c446dcd6c56c718c3

                                                                                                                                                    SHA1

                                                                                                                                                    412883fd3bb56f2b850d2c29ee666d9b75636faf

                                                                                                                                                    SHA256

                                                                                                                                                    2ed31146dc94132acafc7e759086f18c83560693a813b1d842a30908f50faf7c

                                                                                                                                                    SHA512

                                                                                                                                                    9866ddd370e7ab75aea143c5ede3ee96700ed662aab7fb3e989f9beedb2800b488f985a8069a61025cc8201bbc42e23d744717988587c2a8a66f2e91ea7cbbbc

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    1.6MB

                                                                                                                                                    MD5

                                                                                                                                                    ae390fa093b459a84c27b6c266888a7e

                                                                                                                                                    SHA1

                                                                                                                                                    ad88709a7f286fc7d65559e9aee3812be6baf4b2

                                                                                                                                                    SHA256

                                                                                                                                                    738b7b5da8ca4798043672d2a32913e0f64268c7861eecc9fcc4c7f9d440d8cd

                                                                                                                                                    SHA512

                                                                                                                                                    096b5190efefe4c5272637e0721dcd339883f551c5e0cce568ed0bd63b31fb9acef6b09d310966482dbc7a944cc7a5878b0ad6bd68c30d1871254865a1660851

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                    MD5

                                                                                                                                                    24eeb998cb16869438b95642d49ac3dd

                                                                                                                                                    SHA1

                                                                                                                                                    b45aa87f45250aa3482c29b24fa4aa3d57ae4c71

                                                                                                                                                    SHA256

                                                                                                                                                    a2cfd55902b1750070e9154a90e29a10b9e6fa0c03bc82d8f198678e9bc46cd0

                                                                                                                                                    SHA512

                                                                                                                                                    2ac6de5c3e52b31355300ff4e846ed0627d8d4af02c4c07c0886694a09237ef2ee76e004883fae76a959bef0b60bd4138a9c88ad22139c6b859786c8e37bb358

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe

                                                                                                                                                    Filesize

                                                                                                                                                    3.6MB

                                                                                                                                                    MD5

                                                                                                                                                    69e1e0de795a8bf8c4884cb98203b1f4

                                                                                                                                                    SHA1

                                                                                                                                                    a17f2ba68776596e2d1593781289c7007a805675

                                                                                                                                                    SHA256

                                                                                                                                                    2b6d153b9df86033b7a83eb4f521fd4f7aeec35dc54ef8d1ffe80f5bbd030dbb

                                                                                                                                                    SHA512

                                                                                                                                                    353b664271d0f49f94b60c7fbaf5ab6d5b8df7690383517a90ba675f750d9b28628bbd5ed92a6782879607f4c21214b15ea95fd6a5a8d6f9540a1b75ddb9e665

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    2.8MB

                                                                                                                                                    MD5

                                                                                                                                                    032ee4d65b62d87cf809438556d30429

                                                                                                                                                    SHA1

                                                                                                                                                    34458fcefe3c67f19c3d2c94389fc99e54e74801

                                                                                                                                                    SHA256

                                                                                                                                                    0099c710e406e0423bb0b11eb4c113508c67f84a0972a2d14c038687cac1753b

                                                                                                                                                    SHA512

                                                                                                                                                    6b912d51e93f1e4756ecc5321ec08a6eb5e15413a9d9cf568bd14ce2a5199d064f6dd5c7d9d5155296d1a4ab5852c81a8fc138565fb788e7402c09b61281a5cd

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    1.3MB

                                                                                                                                                    MD5

                                                                                                                                                    b8bffe8467716db4da9d94061dc33d07

                                                                                                                                                    SHA1

                                                                                                                                                    db4bac1757b1b60b26e2fef0fc88ce708efad352

                                                                                                                                                    SHA256

                                                                                                                                                    b03986224aa28f1e1850bd2fcd1a5f5f2fea34c2c0815d8e6943f0a98b754af2

                                                                                                                                                    SHA512

                                                                                                                                                    5d6f6363c9c87c61d2be785280d420725fe7cc4b68908e78fc82dc480260a400500a84f1c9247b34437cd520d702ef5fc4546024fed891231630514d1418592c

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                    MD5

                                                                                                                                                    ecda5b4161dbf34af2cd3bd4b4ca92a6

                                                                                                                                                    SHA1

                                                                                                                                                    a76347d21e3bfc8d9a528097318e4b037d7b1351

                                                                                                                                                    SHA256

                                                                                                                                                    98e7a35dd61a5eeea32ca5ff0f195b7e5931429e2e4b12d1e75ca09ddab3278f

                                                                                                                                                    SHA512

                                                                                                                                                    3cd3d64e7670ab824d36a792faa5d16a61f080d52345e07b0ef8396b2a1481876a3b30fc702bf0018a1b02c7788c3c7f1b016590c5b31485a90e3a375f11dade

                                                                                                                                                  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe

                                                                                                                                                    Filesize

                                                                                                                                                    3.2MB

                                                                                                                                                    MD5

                                                                                                                                                    6b7a2ce420e8dd7484ca4fa4460894ae

                                                                                                                                                    SHA1

                                                                                                                                                    df07e4a085fc29168ae9ec4781b88002077f7594

                                                                                                                                                    SHA256

                                                                                                                                                    dec51011b3bd2d82c42d13f043fac935b52adeaa17427ce4e21e34fcbd2231e4

                                                                                                                                                    SHA512

                                                                                                                                                    7d2cd278ee45ec0e14145f2be26b8cdbe3312b300aa216532c41e839ba61c12ae379025568c85634f0ec3bc95cc481bb17f99ab30c711986651569f0f1f81beb

                                                                                                                                                  • C:\PROGRA~2\MOZILL~1\UNINST~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    141KB

                                                                                                                                                    MD5

                                                                                                                                                    144294f89c5a1ad929b9056ec0760f0f

                                                                                                                                                    SHA1

                                                                                                                                                    91175b430042997c8fb899596afc53bea4bb38c8

                                                                                                                                                    SHA256

                                                                                                                                                    9d1eeb4a9b9ef3d686891ac34e9b4a2379f24fc02ea2e9fc00071d03a86d42ab

                                                                                                                                                    SHA512

                                                                                                                                                    77c2fd3dc1bc710e652e4e4ca7cd73076a3988cf395d977b5a46a395cedd943560f3a5ad2251365c63cd2d3e681e7cf9fc3510d8d778732d7c692831c2fc9898

                                                                                                                                                  • C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe

                                                                                                                                                    Filesize

                                                                                                                                                    494KB

                                                                                                                                                    MD5

                                                                                                                                                    2b10fad55bb461c01d3f922c3fbf7d2e

                                                                                                                                                    SHA1

                                                                                                                                                    e899a087bc0a8b36c79d24505dc72813a25b0eb9

                                                                                                                                                    SHA256

                                                                                                                                                    8f1d9b2c820fb05556bc9ddabafc7e5cf51c5c01075bab11d68ae965ca21f68f

                                                                                                                                                    SHA512

                                                                                                                                                    2a47bf1f477dcf0070e9157cc0b816fd1563075a19286df7bb4d3fc368552d72a95505a35bba961b69b3561d1d858857c14762b7c046c6cf382d08e037f2ec61

                                                                                                                                                  • C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE

                                                                                                                                                    Filesize

                                                                                                                                                    485KB

                                                                                                                                                    MD5

                                                                                                                                                    048da0aced67fe14cbc1801a057b8cef

                                                                                                                                                    SHA1

                                                                                                                                                    9ddac6ad86b54d0b7e1d22fbc1ff75ccfa9c17ea

                                                                                                                                                    SHA256

                                                                                                                                                    2f37cac4a1dbf7944d43f1154ce293311c3f9d44317276a06b49cd41123d9d96

                                                                                                                                                    SHA512

                                                                                                                                                    1d2b23dc25ea03002a3ccbcdf08a7ebf47ee2158bf9211b71830a92dfa4bef584529c1804148ebe2cb662e579cc97e9f702a6a42071f2600a129c642a6b92c16

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.0MB

                                                                                                                                                    MD5

                                                                                                                                                    1eaa1690c3f599711575376a38854557

                                                                                                                                                    SHA1

                                                                                                                                                    da070274cdf89fcd153e6079f868b80bc408fbfe

                                                                                                                                                    SHA256

                                                                                                                                                    b37cb424c61d5f5cef1e829a283a60b14192944bbf94150461b2808ec734144b

                                                                                                                                                    SHA512

                                                                                                                                                    344e9cfb4cffc15e87f154bc6ff99eb4216ff8eaf46f2601b23877008c0d14ee0a08fe911ad94e0c143eb010ae7868caa9ef9fde7d06f2eb954b8a8d38ea82c8

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.0MB

                                                                                                                                                    MD5

                                                                                                                                                    c0dde56230aef0d9b47a01f8eeb319bc

                                                                                                                                                    SHA1

                                                                                                                                                    690c0c5660d64171ca896d701a489d57464a813a

                                                                                                                                                    SHA256

                                                                                                                                                    cb77389e6b6cbd3bc8d1a5d1c6d56e9107fa3927398e054b93d7cfc316ae665a

                                                                                                                                                    SHA512

                                                                                                                                                    ce2c86314c938213ced3fbd232d6afee6260e54e68f0bca1b42b4c7c484fd2ea583325bf8efc28bae0d5ef5aa5759bbfb68f37636a8a2a0c757e730a7dd8fdc9

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\HID.exe

                                                                                                                                                    Filesize

                                                                                                                                                    6.0MB

                                                                                                                                                    MD5

                                                                                                                                                    9d279fbbcbcb06566cec703e6cbbbf68

                                                                                                                                                    SHA1

                                                                                                                                                    1b482e2bf79337c2b37732667eeda8b49f8514ee

                                                                                                                                                    SHA256

                                                                                                                                                    4cb0b308f8a34ffd073503c9728454c5c271118d6f6a401a2e4fbe76fdc72500

                                                                                                                                                    SHA512

                                                                                                                                                    dde2fa5a339f2b295ab02c9019f4609f061a2428c9ee34f85c8e453ada7d24143198e0804786c26df06c93bdef03bd8829125f4c0db3ebf9bd2f2e3cab5a4e47

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\explorer.exe

                                                                                                                                                    Filesize

                                                                                                                                                    21KB

                                                                                                                                                    MD5

                                                                                                                                                    7536c5358d609bdb8aa110d054365e90

                                                                                                                                                    SHA1

                                                                                                                                                    9d02d7962a413d3dbf4acc1b8854b926953b6780

                                                                                                                                                    SHA256

                                                                                                                                                    ab48c7c77a5c56d5773061ee6c18eebf57c359a60241516ce7757fb8b7e11b16

                                                                                                                                                    SHA512

                                                                                                                                                    bf987e34f3daa8e3033b257c5454773452d871ce3c08559f2dea6a83fe0dde360bc3ed4c09589495893f80bb8d84f704243b114339fd5fe58d99ef578fa4c40b

                                                                                                                                                  • C:\Windows\directx.sys

                                                                                                                                                    Filesize

                                                                                                                                                    43B

                                                                                                                                                    MD5

                                                                                                                                                    7389b3ba57d20bc32e2e154c5fd0bf3f

                                                                                                                                                    SHA1

                                                                                                                                                    f6d6c67bd8ced8c55996b7e5622206aea85dd0ff

                                                                                                                                                    SHA256

                                                                                                                                                    e563f572707537629560a98e383345a864512907aaa27b3c1c7802b0769a7b16

                                                                                                                                                    SHA512

                                                                                                                                                    aea75b437839187d9759c2bdfd20603a5328af4e22c86f2a5decfe1434e88760e52ab1a8342b538055c8a80a6e354ad4f86a52286c59ee39f4a890136d7b66ae

                                                                                                                                                  • C:\Windows\directx.sys

                                                                                                                                                    Filesize

                                                                                                                                                    48B

                                                                                                                                                    MD5

                                                                                                                                                    00785a283df1a7e78ddee7404392f44a

                                                                                                                                                    SHA1

                                                                                                                                                    79d8f0dea5261dec69d10e60ea6636b5a7b319b5

                                                                                                                                                    SHA256

                                                                                                                                                    631290c87d0f86db393312671ac3ee5e452384b31772f62f920e7cc591b1c16e

                                                                                                                                                    SHA512

                                                                                                                                                    491bfd205ca2389eff302938931cc9b8d5b7cb5966962947bf035287cf39bd43055c0e9f06dec232035d410bfab41cc9542d07dc86be6ba864cb6b7e2db6bad0

                                                                                                                                                  • C:\Windows\svchost.com

                                                                                                                                                    Filesize

                                                                                                                                                    40KB

                                                                                                                                                    MD5

                                                                                                                                                    bb437b70bff9be8f5fba089204a9d70f

                                                                                                                                                    SHA1

                                                                                                                                                    7650b891d5472481d32709dee58840feeb25b69b

                                                                                                                                                    SHA256

                                                                                                                                                    b67de524164843e652193ac9529a0239a269dec0bf6ed714b2d527238562f82a

                                                                                                                                                    SHA512

                                                                                                                                                    d879b4e3fd48409a11a7698399ed0ee55c22c1d61dc7ffae8dc6130bbe72dd5b498162cc268e45e2e77a6bb461295c297df34a76a7da7b54cb6d186779a68410

                                                                                                                                                  • memory/60-412-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/232-864-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/316-348-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/368-967-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/696-96-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/696-81-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/876-397-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/876-1340-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/976-349-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1000-710-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1000-718-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1032-374-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1072-1480-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1132-336-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1144-461-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1160-385-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1172-98-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1428-283-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1480-1267-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1496-1402-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1504-754-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1504-746-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1504-182-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1532-520-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1552-267-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1576-817-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1588-460-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1604-562-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1688-1173-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1688-1309-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1696-153-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1696-177-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1728-118-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1732-104-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1744-1203-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1744-1210-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1748-394-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1756-431-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1832-1102-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1832-1376-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/1856-257-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/1900-423-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2024-1559-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2032-598-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2116-1003-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2124-523-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/2132-1444-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2136-459-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2136-282-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2156-1241-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2228-358-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/2228-134-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/2324-280-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2408-1105-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2496-895-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2500-708-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2512-756-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2524-291-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/2524-1128-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2536-1564-0x0000000000400000-0x0000000001364000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    15.4MB

                                                                                                                                                  • memory/2536-1697-0x0000000000400000-0x0000000001364000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    15.4MB

                                                                                                                                                  • memory/2608-462-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/2624-854-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2624-856-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2628-300-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/2836-1265-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/2944-483-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3000-44-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3000-135-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3020-386-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3084-1202-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3084-310-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3084-1045-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3104-476-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3192-526-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3192-524-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3192-671-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3320-1561-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3328-782-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3328-1349-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3332-1515-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3332-1510-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3436-36-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3436-43-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3508-639-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3524-777-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3524-779-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3572-264-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3596-1070-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3624-601-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3640-547-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3676-318-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3704-484-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3708-932-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3732-346-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3748-319-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3756-903-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3764-502-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/3764-1069-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3848-862-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3900-1411-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/3980-469-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4016-485-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4024-1211-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4052-366-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4128-962-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4200-1033-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4200-1043-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4200-1165-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4264-64-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4268-521-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4284-129-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4292-825-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4328-424-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4328-1242-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4372-1127-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4404-458-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4404-289-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4424-510-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4424-936-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4464-53-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4472-494-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4480-570-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4492-637-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4580-533-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4584-67-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4748-1523-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4752-404-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4776-1443-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4776-1311-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4776-1694-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4812-994-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4828-439-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/4840-1378-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4872-311-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4876-1488-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4908-164-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4908-256-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    336KB

                                                                                                                                                  • memory/4908-432-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/5028-328-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB

                                                                                                                                                  • memory/5112-443-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    108KB